Sonrai Security Releases Industry-First Risk Insights Engine 👉
Learn More
Search Login
Sonrai Security Logo
  • Product
    • Cloud Permissions FirewallA one-click solution to least privilege without disrupting DevOps.
    • CIEM +Discover, monitor & secure critical data.
    • Interactive TourExplore our products in a quick walkthrough.
      • Cloud Permissions Firewall Interactive Tour
A one-click solution to least privilege without disrupting DevOps.
      • CIEM + Interactive TourBreak toxic permission chains creating pathways to your data.
    • Start a 14- day free trial
    • Get Started
  • Solutions
        • Use Cases
          • Least Privilege
          • Third-Party Access
          • Just-in-Time Access
          • Privileged Access Management
          • Attack Path Disruption
          • Audit and Compliance
        • User Role
          • CloudOps
          • DevOps
          • Security
  • Pricing
  • Resources
        • Resource Library
        • Customer Stories
        • ACCESS
        • Blog
        • Webinars
        • Videos
        • From the research team
        • Cloud Permissions Firewall ROI
        • Identity Security Maturity Guide
        • ROI Calculator
        • Data Report: Cloud Access Risk
        • Get More Research
        • Read More
  • Customers
  • Company
    • About Us
      • Why Sonrai
      • Story & Leadership
      • Careers
      • News
    • Partners
      • Global System Integrators
      • Solution Providers
      • Empty Menu
    • Sign In Sign Up for Free
      Search Login
Sign In Sign Up for Free
Sonrai Security Logo
  • Product
    • Cloud Permissions FirewallA one-click solution to least privilege without disrupting DevOps.
    • CIEM +Discover, monitor & secure critical data.
    • Interactive TourExplore our products in a quick walkthrough.
      • Cloud Permissions Firewall Interactive Tour
A one-click solution to least privilege without disrupting DevOps.
      • CIEM + Interactive TourBreak toxic permission chains creating pathways to your data.
    • Start a 14- day free trial
    • Get Started
  • Solutions
        • Use Cases
          • Least Privilege
          • Third-Party Access
          • Just-in-Time Access
          • Privileged Access Management
          • Attack Path Disruption
          • Audit and Compliance
        • User Role
          • CloudOps
          • DevOps
          • Security
  • Pricing
  • Resources
        • Resource Library
        • Customer Stories
        • ACCESS
        • Blog
        • Webinars
        • Videos
        • From the research team
        • Cloud Permissions Firewall ROI
        • Identity Security Maturity Guide
        • ROI Calculator
        • Data Report: Cloud Access Risk
        • Get More Research
        • Read More
  • Customers
  • Company
    • About Us
      • Why Sonrai
      • Story & Leadership
      • Careers
      • News
    • Partners
      • Global System Integrators
      • Solution Providers
      • Empty Menu
    • Sign In Sign Up for Free
      Search Login

Interactive Product Tour

interactive tour Start a Tour Get a Demo
Search Login
Sonrai Security Logo
  • Product
    • Cloud Permissions FirewallA one-click solution to least privilege without disrupting DevOps.
    • CIEM +Discover, monitor & secure critical data.
    • Interactive TourExplore our products in a quick walkthrough.
      • Cloud Permissions Firewall Interactive Tour
A one-click solution to least privilege without disrupting DevOps.
      • CIEM + Interactive TourBreak toxic permission chains creating pathways to your data.
    • Start a 14- day free trial
    • Get Started
  • Solutions
        • Use Cases
          • Least Privilege
          • Third-Party Access
          • Just-in-Time Access
          • Privileged Access Management
          • Attack Path Disruption
          • Audit and Compliance
        • User Role
          • CloudOps
          • DevOps
          • Security
  • Pricing
  • Resources
        • Resource Library
        • Customer Stories
        • ACCESS
        • Blog
        • Webinars
        • Videos
        • From the research team
        • Cloud Permissions Firewall ROI
        • Identity Security Maturity Guide
        • ROI Calculator
        • Data Report: Cloud Access Risk
        • Get More Research
        • Read More
  • Customers
  • Company
    • About Us
      • Why Sonrai
      • Story & Leadership
      • Careers
      • News
    • Partners
      • Global System Integrators
      • Solution Providers
      • Empty Menu
    • Sign In Sign Up for Free
      Search Login

Interactive Product Tour

interactive tour Start a Tour Get a Demo
Search Login
Back to Events & Webinars
Webinar

How Public Cloud Changes Cybersecurity for the Better

Webinar Details
Date & Time: 12.17.2019
Type: On Demand
Watch Now

Presenters:
Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research

While many basic security controls are enduring, public cloud (AWS, Azure, and Google Cloud) has introduced a wave of new practices, tactics, and forms of automation to implement those controls. In total, these capabilities are going to make cloud security better than on-premises methods. The elasticity and scale of public cloud has led to more integrations of cybersecurity in the creation of computing assets. The abundant data available has led to new forms of automated configuration and monitoring for breaches. Software-defined everything and APIs have given cybersecurity systems a wider range of power and opened the way for declarative methods of implementing security in the cloud. In this webinar, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, will look at how public cloud is changing cybersecurity for the better and the long term impact of these new capabilities. One key impact is that soon on-prem data centers will be recognized as less secure than cloud data centers.

Key questions:

  • What are the core differences between cloud security and on-premise methods?
  • How has abundant data opened up new possibilities for monitoring and automation?
  • What is the impact of software-defined infrastructure?
  • Why is identity central to security in public cloud?
  • How has public cloud security broken new ground in managing complexity?
  • What new forms of automation of security are emerging in the cloud?
  • Are AI and ML being implemented faster in the cloud?
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on Linkedin
Sonrai Main Logo
  • Solutions
    • Cloud Permissions Firewall
    • CIEM
  • Why Sonrai
    • Interactive Tour
  • Platform Details
    • Free Trial
    • Pricing
  • Use Case
    • Least Privilege
    • Third-Party Access
    • Just-in-Time Access
    • Privileged Access Management
    • Attack Path Disruption
    • Audit & Compliance
  • User Roles
    • CloudOps
    • DevOps
    • Security
  • Learn
    • Resource Library
    • Customer Stories
    • Access Summit
    • Blog
    • Videos
    • Webinars
    • Cloud Permissions Firewall ROI
  • Company
    • Why Sonrai
    • Story & Leadership
    • Careers
    • News
    • Awards & Recognition
    • Contact us
  • Partners
    • Global System Integrators
    • Solution Providers
  • Link to Twitter
  • Link to Linkedin

© 2025 Sonrai Security. All rights reserved

Privacy Policy  |  

Sonrai cloud security platform, products and services are covered by U.S. Patent Nos. 10,728,307, 11,134,085, and 12,218,982, together with other domestic and international patents pending. All rights reserved.

Scroll to top