AWS and Cloudanix team co-authored this blog: Real-Time Threat and Anomaly Detection for Workloads on AWS
Back to Changelog
new release May 7, 2024

Enhanced Vulnerability Management, Fine-Tune Code Security Settings & More

Fueled by your invaluable feedback, Cloudanix continues to evolve! This update prioritizes empowering you with better data consumption. Experience granular filtering controls, tailor your code security with advanced settings, and leverage enhanced reporting capabilities. We are committed to providing you with the tools you need to make informed decisions and achieve optimal security outcomes.

Read to see what we have cooked up for you.


Vulnerability Management for Hosts

Now, gain complete control over your virtual machine security. See all open vulnerabilities at a glance, with detailed information on severity, exploit complexity, attack vectors, and other crucial factors. This enhanced visibility empowers you to prioritize threats effectively, streamlining your vulnerability triaging and remediation process.

Paired with existing File Integrity Monitoring and Malware Analysis, VM Vulnerabilities Management forms a powerful shield, keeping you one step ahead of attackers.

List of vulnerabilities in cloud environment — Cloudanix dashboard
Detailed information about the severity — Cloudanix dashboard

Software Screen-Shot

Software Screen-Shot


Improved Filter Control

Our all-new Filter Control empowers you to dissect your findings with better granularity. Simply choose your desired “Area of Filter,” then drill down and select the specific values you need.

This interface puts you in complete control, allowing you to effortlessly pinpoint the exact information you are searching for.

Software Screen-Shot All new filter control feature

<img src=“/images/changelog/enhanced-vulnerability-management/enhanced-vulnerability-managementSS4.webp” alt=“Software Screen-Shot” class=“rounded-2xl border-10 border-gray-50”

/> Controls based on severity


Code Security Settings

Each practitioner looks at Code Security in a slightly different way. To empower this diversity, we are introducing advanced Code Security Settings.

This allows you to define:

  • Capabilities to use
  • Scan Triggers
  • Full Scan Schedule (Daily, Weekly, Monthly, etc.)
  • PR Failure conditions (Critical Count, High Count, Allowed CVEs, etc.)
  • Jira Integration parameters

This flexibility ensures Code Security that adapts to your development process, optimizing efficiency and maximizing security.

Software Screen-Shot

Software Screen-Shot

Code security settings screenshots


PDF Reports for Code & Host Security

Now you can generate detailed Security Posture Reports for Code Security and Host Security, and share them with other stakeholders inside and outside of the organization.


Blogs


Additional Resources


Industry News


TODO:// is not an option for Cloud Security

Comprehensive cloud security platform covering code to cloud protection

Security for your Code, Cloud and Data

Cloudanix replaces your 5-6 disjointed security tools within 30 minutes.

Get Started

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Tuesday, Feb 10, 2026

The 2026 CNAPP Compliance Framework: Turning Audit from Crisis to Continuity

Introduction: The Death of the Point-in-Time Audit In the high-velocity cloud landscape of 2026, the traditional app

Read More

Thursday, Feb 05, 2026

CSPM vs. CNAPP: Navigating Cloud Security Evolution for Modern Enterprises

The shift to cloud-native architectures represents a fundamental change in how applications are designed, built, and dep

Read More

Thursday, Jan 22, 2026

Top 10 Identity and Access Management Solutions

Identity and Access Management (IAM) has traditionally been considered one of the boring parts of security. But with the

Read More