
If found, malware is reported in Dig’s dashboard as a risk and notification is sent to the team for immediate remediation.CrowdStrike’s automated malware analysis scan the data to detect potential threats.Dig calls CrowdStrike’s Threat Intelligence API to perform analysis on the newly discovered data.Dig identifies data issues that need attention such as sensitive data found in non-compliant locations, shadow data containing sensitive information and other executables that require analysis.Dig’s data security platform performs data discovery and classification of customer data anywhere across clouds environments, building a unified inventory of all the data.The following diagram shows the integration as it works step-by-step: When combined with CrowdStrike’s Falcon Intelligence, upon the discovery of new cloud object storage, the joint solution automatically scans it for malware and issues a risk upon identification to ensure timely removal of the infected data. A new approach that combines data security posture management (DSPM) with malware analysis can prevent this from happening.Īutomated cloud data security with Malware Analysis: How it worksĭig's data security posture management (DSPM) platform is an agentless cloud-native solution that deploys in minutes and provides visibility and control with real-time monitoring into all the data that customers store and process in the cloud. Unmonitored and unsecured data can easily be infected by malware, and if not detected, it evolves into a ticking time bomb that threatens business processes and operations. Due to the explosion of data that is impacting public clouds and other cloud data environments, it is too easy for security professionals to lose track of what data is stored in the cloud and how it is being handled.


Organizations rely on the ability to upload large amounts of data to the cloud.
