
Upwind Extends its Runtime-Powered Cloud Security Platform with API Security
In today’s digital world, where cloud security threats are constantly evolving, Upwind is leading the charge to stay one step ahead of the risks. We’re excited to unveil Upwind API Security, a key part of our comprehensive security platform. With businesses relying more on online services to operate, the need for strong, adaptable protection has […]

Streamline Auditing and Secure Your Infrastructure with Upwind’s SSH Session Monitoring
We are excited to announce the release of a significant new capability – SSH session monitoring. In the dynamic landscape of remote system management, Secure Shell (SSH) serves as a pivotal tool, providing seamless access and control. However, this convenience also presents a Pandora’s box of potential security risks when SSH sessions go unmonitored. SSH, […]

Automate Threat Detection & Response for Kubernetes Workloads
Upwind’s real-time threat detection capabilities have helped our customers identify threats and bad actors the moment they enter their cloud environment. This real-time, runtime-powered capability is the definition of shift-right security, and we have now taken it one step further by providing the ability to respond to threats as soon as they are detected. With […]

Seamless Hybrid-Cloud Security with Upwind’s BYOC
We are excited to announce the launch of a significant new capability within the Upwind platform – Bring Your Own Cloud (BYOC)! Upwind has always supported cloud-native and multi-cloud environments across AWS, Azure and GCP, and starting today, you can also connect to other cloud providers such as Oracle and IBM Cloud or your hybrid […]

Upwind’s CI/CD Awareness Streamlines Root Cause Analysis
In order to solve a problem, you have to know how it started. In cloud security, getting to the root cause of threats and vulnerabilities is often a labor-intensive process that can take hours or even days, costing companies valuable time to remediation. To solve this problem, Upwind has expedited the investigation process, providing detailed […]

Launching Upwind’s Runtime Vulnerability Management
Continuous Runtime Vulnerability Management at Scale