Datadog's 2025 State of Cloud Security Report finds companies adopting data perimeters to combat credential theft, with 40% already using this advanced practice. Data perimeters are implemented through S3 bucket and VPC endpoint policies, while centrally managed multi-account environments are also growing in popularity. Credential theft remains a major attack vector, with 59% of AWS IAM users having an access key older than one year.
Intrusion Inc. (INTZ) has recently announced the availability of Intrusion Shield Cloud in the AWS Marketplace, marking a significant expansion of its cloud security offerings. This initiative not only broadens the company's footprint but also reinforces its commitment to protecting modern organizations from evolving cyber threats
Intrusion Unveils Shield Cloud on AWS Marketplace for Threat Prevention[1].
Intrusion Shield Cloud acts as a virtual firewall gateway designed for autonomous threat prevention. It proactively stops network traffic associated with malicious or suspicious entities before they can adversely impact the system. This solution expands Intrusion's network protection to cover workloads running in cloud environments, addressing a critical gap in cloud security solutions that often focus solely on external threats
Intrusion Unveils Shield Cloud on AWS Marketplace for Threat Prevention[1].
The key strength of Intrusion Shield Cloud lies in its autonomy. It continuously analyzes network traffic and proactively blocks outbound calls to malicious IPs and domains, mitigating potential attacks in their nascent stages. This approach minimizes false alerts and reduces the operational overhead associated with traditional alert-based security tools. Intrusion's cyber threat intelligence engine, built on more than 30 years of innovation, provides near-complete network visibility at high speeds, combining behavioral insights, reputation data, manual analysis, and extensive historical records
Intrusion Unveils Shield Cloud on AWS Marketplace for Threat Prevention[1].
Intrusion Shield Cloud is designed to address the growing concern of credential theft, which remains a major attack vector. According to Datadog's 2025 State of Cloud Security Report, 40% of companies are adopting data perimeters to combat this threat, with 59% of AWS IAM users having an access key older than one year . Data perimeters are implemented through S3 bucket and VPC endpoint policies, while centrally managed multi-account environments are also gaining popularity.
INTZ's strategic shift toward a recurring revenue model through MSPs, MSSPs, and VARs positions the company well for future performance. Additionally, a clear long-term roadmap for product growth, built on strong core technology assets, further supports Intrusion's potential for continued success
Intrusion Unveils Shield Cloud on AWS Marketplace for Threat Prevention[1].
Comments
No comments yet