AWS and Cloudanix team co-authored this blog: Real-Time Threat and Anomaly Detection for Workloads on AWS
Back to Changelog
new release February 13, 2024

Attack Vector Enhancement, Image Security with Prioritization, Code Blocks and Workflows

January was a busy month for both the business and technical teams. At Cloudanix, we know that user experience is critical, especially for small teams aiming to achieve more with less. This update, shaped by customer feedback, focuses on efficiency and usability.


Guided Tours

We’ve introduced interactive Guided Tours across the platform, helping you navigate with ease and focus on the most critical insights. Designed to enhance learning and onboarding for new users.

Software Screen-Shot

Consolidated findings at glance


Code Blocks and Workflows

Code Security now displays code blocks affected by vulnerabilities and enables triaging via the new Review Capability, which includes:

  • Pause
  • Acknowledge
  • Accept Risk

This allows security teams to manage findings more efficiently.

Software Screen-Shot Code security showcasing affected vulnerabilities
Software Screen-Shot Code security feature open ticket option


Time-Based Filters for Events

Events, Threats & Anomalies now support a Time-based “Events Since” filter, allowing you to quickly view and analyze recent activity for faster response.

Software Screen-Shot Events based filters now available


Attack Vectors Include Subdomain Findings

Attack Vectors are now extended to include findings from vulnerable subdomains, broadening visibility into potential attack surfaces.

Software Screen-Shot Assets with attack vectors


Image Security Prioritization

Image Security now supports grouping findings by vulnerabilities, packages, and CVEs, along with active cluster usage data, enabling prioritization of remediation.

Software Screen-Shot Image security is more enhanced


Multiple and Area-Specific Jira Projects

Cloudanix now integrates with multiple Jira projects, allowing you to assign specific projects to specific capabilities (e.g., code security vs. misconfiguration). This improves task organization and streamlines workflows.


Cloudanix Blogs

Additional Resources

Industry News


TODO:// is not an option for Cloud Security

cta-image

Security for your Code, Cloud and Data

Cloudanix replaces your 5-6 disjointed security tools within 30 minutes.

Get Started

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Tuesday, Sep 30, 2025

Eliminate Standing Access: Introducing JIT Kubernetes for Azure AKS Security

The Security Mandate: Why Permanent Access Fails Mission-Critical AKS Kubernetes has become the operating system of

Read More

Friday, Aug 08, 2025

User Access Review in Cloud Security: A Foundational Guide to Securing Your Cloud Environment

Introduction: The Unseen Gatekeepers of Cloud Security In the rapidly expanding landscape of cloud computing, organi

Read More

Saturday, Aug 02, 2025

Streamlining Just-in-Time Access: Balancing Security and Developer Workflow Integration

Introduction Just-in-Time (JIT) access is an undisputed cornerstone of modern cloud security. By eliminating standin

Read More