The PaaS (platform as a service) offers an integrated security suite, as well as individual modules, for end-to-end threat visibility, detection, and incident response, and works in multicloud environments. Credit: CIS Offering to consolidate cybersecurity services on a single PaaS (platform as a service), Tata Consultancy Services (TCS) has launched Cyber Defense Suite, designed to provide end-to-end threat visibility, extended detection, and automated incident response.The PaaS, developed to work in multicloud environments, includes security governance risk and compliance support, as well as management capabilities for digital identity and access, vulnerability remediation, and third-party cyberrisks.“By offering multiple cybersecurity services across IT ecosystems, synergized into a single platform, the suite allows our customers to have the visibility to manage threats and risks across their entire technology landscape, rather than having to work with disparate platforms, at times from different vendors,” says Santha Subramoni, global head of cybersecurity for TCS. PaaS offers integrated suite, and individual modulesThe PaaS offers different applications either as an integrated suite or as individual modules, depending on the needs of an organization. This enables customers to scale up or down within the platform and across geographies as their needs change, Subramoni says. To that end, a customer subscribed to one or just a few modules of the suite can request other modules or augment services within existing modules by “clicking a button” on a dashboard. “TCS understood that their customers — large, global, complex organizations — are not in a position to rip and replace massive systems,” says Liz Miller, an analyst at Constellation Research. “They need modular systems on top of composable architectures that allow for flexibility, scalability and visibility. They need to be able to add what they need to fill in gaps and quickly get up and running.”Interface adapts to user rolesThe new Cyber Defense Suite will feature a persona-based interface for key stakeholders like CXOs and CISOs, such that the interface that different users see will depend on their role. The CXO dashboard, for example, will provide a business-process oriented view of the cybersecurity controls in use, the risks associated with each process and the RoI (return on investment) for allocated cybersecurity budget. This helps the CXOs quantify potential business impact and prevent security attacks through early detection and response, according to Subromoni.The CISO dashboard, on the other hand, will provide a view into an organization’s cybersecurity posture across internal and external threats — with details on compliance and security controls —and generate security alerts.“All security insights are derived by extracting the data from security tools and controls deployed in the enterprise ecosystem, thereby providing a contextualized, end-to-end view into threats as well as their cybersecurity posture,” says Subramoni. Related content news analysis AWS and Google Cloud command-line tools can expose secrets in CI/CD logs Cloud vendors say it is up to users to ensure sensitive command outputs are not saved in logs By Lucian Constantin Apr 17, 2024 4 mins Cloud Security Data and Information Security news SAP users are at high risk as hackers exploit application vulnerabilities Research highlights heightened threat actor interests in SAP systems, targeting poorly patched organizations. By Shweta Sharma Apr 17, 2024 4 mins Application Security Vulnerabilities news analysis Understanding CISA's proposed cyber incident reporting rules CISA’s massive rulemaking will create the first US cyber incident and ransomware payment reporting mechanism that promises to radically overhaul the workloads of most cybersecurity professionals. By Cynthia Brumfield Apr 17, 2024 10 mins Regulation Ransomware Cyberattacks feature Where in the world is your AI? Identify and secure AI across a hybrid environment As AI becomes integral to systems brought into the enterprise ecosystem it is increasingly critical for security teams to know where it is and reduce its risks. By Deb Radcliff Apr 17, 2024 9 mins Application Security Cloud Security Network Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe