Jump to content

Draft:CheckRed Security

From Wikipedia, the free encyclopedia
  • Comment: Please read through all the above linked information. Most of the sources are not reliable or useful for establishing notability. Also, the Forbes article is not a reliable source (see WP:FORBESCON). Also, this is written like a marketing brochure. S0091 (talk) 17:32, 4 October 2024 (UTC)

CheckRed, LLC
Company typePrivate Company
IndustryCybersecurity
Founded2021
Founders
Headquarters
Dallas
,
United States
Area served
Worldwide
Key people
  • Scott Hammack (Chair)
  • Pat Clawson (CEO)
  • Dan Thormodsgaard, (CTO)
ProductsComplete Cloud Security
Services
Websitewww.checkred.com[10]

CheckRed, founded in 2021, is a privately-held cybersecurity company that provides cloud cybersecurity solutions. Its platform addresses compliance, identity management, and infrastructure security.[11][12] It analyzes cloud infrastructures hosted on Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and Kubernetes, as well as SaaS applications like Salesforce and Microsoft 365, to detect potential vulnerabilities and misconfigurations that could be exploited by unauthorized entities, aiming to protect cloud resources and prevent data breaches.[13][14][15][16]

Services

[edit]

CheckRed provides a range of services designed to protect cloud-native applications, ensure compliance, and manage entitlements and identities within cloud environments.[17][18] The platform monitors cloud providers such as AWS, GCP, Azure, and Kubernetes, as well as SaaS applications like Okta and ServiceNow, to address various cloud security challenges at both the infrastructure and application levels.[19][20][21]

History

[edit]

CheckRed was founded in 2021 to address emerging cloud security challenges faced by enterprises worldwide.[22][23] The company's platform combines multiple facets of security management, providing a unified approach to securing cloud resources.

See also

[edit]

References

[edit]
  1. ^ "16 Low-Cost And Open-Source Tools And Platforms Tech Experts Recommend". Forbes. July 12, 2022. Retrieved October 2, 2024.
  2. ^ Tang, Changlong; Liu, Jiqiang (May 2015). "Cloud computing security issues and challenges: A survey". Computers & Security. 50: 60–73. doi:10.1016/j.cose.2015.02.001. Retrieved August 13, 2024.
  3. ^ "Cloud-Native Application Protection Platforms". Gartner. Retrieved August 13, 2024.
  4. ^ "Empowering Cloud Security: Unleashing the Potential of Cloud Infrastructure Entitlement Management". Turcomat. Retrieved August 13, 2024.
  5. ^ "Securing Cloud Infrastructure: Best Practices and Strategies". Theseus. Retrieved August 13, 2024.
  6. ^ "Empowering Cloud Security: Unleashing the Potential of Cloud Infrastructure Entitlement Management". ResearchGate. Retrieved August 13, 2024.
  7. ^ "What is Cloud Workload Protection Platform (CWPP)?". Microsoft. Retrieved August 13, 2024.
  8. ^ "Guide to Kubernetes Security Posture Management (KSPM)". The New Stack. 21 May 2024. Retrieved August 13, 2024.
  9. ^ Donalds, Charlette; Osei-Bryson, Kweku-Muata (April 2020). "How Cloud Security Providers Can Gain Competitive Advantage Through Cloud Security Posture Management". International Journal of Information Management. 51. doi:10.1016/j.ijinfomgt.2019.102056. Retrieved August 13, 2024.
  10. ^ https://www.checkred.com
  11. ^ "On the Radar: CheckRed Offers a Multi-Tenant Platform for Cloud-Native and SaaS Security". Omdia. Retrieved October 2, 2024.
  12. ^ "CheckRed appoints Pat Clawson as CEO". Help Net Security. July 18, 2023. Retrieved October 2, 2024.
  13. ^ Monika Dastbaz, Fatemeh Khodadad (2016). "Cloud Computing Security Issues and Challenges". Procedia Computer Science. 79. Elsevier: 517–526. doi:10.1016/j.procs.2016.07.335. Retrieved October 1, 2024.
  14. ^ "7 Significant Findings From the 2022 SaaS Security Survey Report". Cloud Security Alliance. December 19, 2022. Retrieved October 1, 2024.
  15. ^ "Cost of a Data Breach Report 2023". IBM. 2023. Retrieved October 1, 2024.
  16. ^ "Cloud Computing and Cybersecurity: Everything You Need to Know". ISA Global Cybersecurity Alliance. Retrieved October 2, 2024.
  17. ^ "Article on Gale: CheckRed and Cloud Security". Gale. Retrieved October 2, 2024.
  18. ^ "CheckRed: Improving Cloud IAM with Net Effective Permissions". SOC Investigation. 4 June 2024. Retrieved October 2, 2024.
  19. ^ Ramgovind S, Eloff MM, Smith E (2018). "Empowering Cloud Security: Unleashing the Potential of Cloud Infrastructure Entitlement Management". Procedia Computer Science. 130. Elsevier: 101–108. doi:10.1016/j.jestch.2018.05.010. Retrieved October 1, 2024.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  20. ^ "Protecting Your SaaS Applications: A Security Guide". Cyber Defense Magazine. 2023. Retrieved October 2, 2024.
  21. ^ "Cloud Computing and Cybersecurity: Everything You Need to Know". ISA Global Cybersecurity Alliance. Retrieved October 2, 2024.
  22. ^ "Enhanced Cloud Security Measures". Sensors. 23 (8): 4117. 2023. Retrieved October 2, 2024.
  23. ^ "Securing the Future: Enhancing Cybersecurity in 2024 and Beyond". ISACA Now Blog. February 12, 2024. Retrieved October 2, 2024.