In order to solve a problem, you have to know how it started. In cloud security, getting to the root cause of threats and vulnerabilities is often a labor-intensive process that can take hours or even days, costing companies valuable time to remediation. To solve this problem, Upwind has expedited the investigation process, providing detailed root cause analysis within seconds. Today, we are excited to introduce a powerful new capability—Upwind’s Image Overview.

The Challenge: Pinpointing the Source

Unraveling the origins of security incidents and vulnerabilities often centers around one critical question: What has changed to introduce these issues? Was it an update, a configuration adjustment, or some other factor?

At present, tracking down the root cause of threats and vulnerabilities can take teams hours or even days – wasting valuable time that could be used for remediation. Upwind acknowledges this challenge and proudly presents the Image Overview as a valuable tool to streamline your investigations.

Introducing Image Overview: A Fresh Perspective

Upwind’s Image Overview leverages runtime and CI/CD context to provide you with a comprehensive view of images in your environment. This feature increases visibility into your running images, simplifying your investigations and significantly accelerating the root cause analysis process. 

The Image Overview starts by furnishing a comprehensive data set, encompassing vital vulnerability insights, image build details, and resource image utilization. It reveals the total vulnerabilities, newly introduced ones, and fixed ones. 

Upwind’s Image Overview gives you vital insights into image usage from code to cloud, including the build platform, last build timestamp, and pull requests that contributed to the image’s creation. Using runtime insights also provides a clear view of resources currently using the image, helping teams prioritize and remediate the vulnerabilities that matter to their organization. 

PjDrNBLedt2HRKM8NFMvwiI07oCV5kZiPydpylVlTHmMEckNEDJ9XbgsjyiRGJESpuSZ1sfYb4qnuWm4smtsQu5rr_3rdPMaMly_HumyBG80wcGPiA6FtHxriAbG3SjabGjOJcYCXdfPank0BeN3IWM

Efficient Root Cause Analysis

The Image Overview details make conducting root cause analysis more efficient and comprehensive. Whether you are investigating a vulnerability finding, a specific detection, or assessing the impact of an image, this new capability empowers you to identify the relevant details and collaborate swiftly with your teams to address the issue.

Start Utilizing Comprehensive Image Details

The Image Overview seamlessly integrates with different sections of the Upwind platform, enhancing your user experience across the following areas:

Inventory Section: Easily access a comprehensive list of images with a click, linking to image overviews.

Q9q2hnrl3m1ytmK6yGX-ZCL0D59VtXXZRE1coBn8evrEWKmeoh5987B-bYb0xFRkBUe2MgXeNnHvEV-R8Y_hF13BO5anCQYSFwzB02x4IW_ZIbgvBF5oHUn2Dr_AwVzCL3lvUfL_5pD-MTYDbN4qPNk

Vulnerability Management: Locate relevant images holding CVE-associated packages through the vulnerability context graph, with one-click access to image details.

vDCvsaEG4j2pgNW2MCEGW3ENfxjxR2Zm3RBHsKF7u1tk0UvYpn52yg8MR1_16GE9hzyq6jtpWyh4WQKF2SDyiGflkxlmmYsxOE2M-L1GUd7qtH3QmvijYgKl7BMmRowHn_rTJ3lR_Bi52BINuoXefME

Threat Detection: In detections, view resource-related build/delivery actions prominently displayed in the context graph. Drill down for detailed image insights.

swnghmqWO1_tZV8031Dz4yBrF5xAfV_tIakSTKSBT7cpaHkGIv1pQZakdHhmW-LeLv2LLrrrkrJjfRKbmpzpVW-0VQj-7TLSa5aXYbBIwXxGT0xhWzytUkyEgIX2s5J5HAevLRinOjFWdC9mNJ78Mfk

Resource Overview: Quickly identify resource-linked images and navigate to comprehensive details.

a_aV8jkyVnmJjJaUWocxGq4kCgR9MAWQZem9YCV7IOuqPaqp79GjhCdHk2_U069aSKOoIyj8KNjEhCf5Sok1M7e-BS0WmEWYEpdWdRXsdORiwO1woDfp82qHXd34mRJfa4HiGe6hokRVMB7_h4E8BDs

As threat actors use increasingly advanced attack methods, identifying the root cause of threats and vulnerabilities is crucial for organizations. Upwind’s Image Overview feature gives you the capability to identify root cause within seconds, saving your team countless hours and giving you the ability to stay ahead of threats and risks.

Learn More

To learn more about Upwind’s runtime detection and response capabilities, refer to the Upwind Documentation Center (login needed).

To see a live demo of Upwind in action, please email us at [email protected].