• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
The Oakmont Group

The Oakmont Group

Help your company podcast get 100,000 downloads

  • Federal Tech Podcast
  • Bike for Your Beer
  • Swing for the Stars
  • About
  • Contact

Ep. 79 Agentless Cloud Security

June 22, 2023

apple podcasts logo
spotify logp
AWS Public Summit
jefff hudson
Doug Hudson, Orca Security
orca logo

(We recorded this from the floor of the AWS Summit at the Washington Convention Center)

When a federal agency takes a legacy application and moves to the cloud, there is typically a challenge in scaling. This can be due to ingesting a tremendous amount of new data, classifying that data accurately, and making sure the correct people get access to that data.

Traditionally, data would be scanned by looking at one machine, some would call this having an “agent” on each machine. When a federal agency had a server down the hall, that was no problem.

However, the size of today’s hybrid cloud systems can make that process slow. This lack of speed can hamper utilizing dynamic data as well as some cybersecurity concerns.

"We don't deploy agents because we're leveraging the native cloud technology to get the information within that cloud ecosystem "

Doug Hudson, Orca Security Tweet

The innovation that Orca Security’s Doug Hudson explains is classified as “agentless.” Orca Security takes a lateral approach to investigate data characteristics.

This approach eliminates the backlog that a traditional, agent-based system gives the user. Doug details some of the benefits of that approach – it can handle multiple risk factors.

First, it allows for a frictionless approach to scaling. It can handle all kinds of risks, everything from identification to malicious code.

Further, this approach gives the administrator the ability to put together a dashboard that will give a visual representation of threats and system analysis as well.

Listen to the interview to understand how Orca Security can help with leaked passwords, exposed credentials, and over-permissive identities.

If you enjoyed this article, you may want to listen to Ep. 73 How to Build Federal Systems for Scale and Resilience 

Transcript for podcast
Transcript for Ep. 79
Federal Tech Podast
John Gilroy

John Gilroy

Has been behind a microphone since 1991.  He can help your company us podcasting to reach your target audience.  johngilroy@theoakmontgroupllc.com  

Federal Tech Podcast AWS Summit Washington,  Doug Hudson,  Ep. 79,  Orca Security

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

federal tech podcast logo

The purpose of the Federal Tech Podcast to discuss innovation to reduce cost for federal technology. Contact us if you think you are a good fit.

Recent Posts

  • Ep. 97 Infrastructure Enabling Federal Innovation
  • Ep. 96 Data Scientist: the Sexiest Job of the 21st Century
  • Ep. 95 How Akamai Improves Federal Cybersecurity
  • Ep. 94 Can Service Mesh Address Federal Challenges?
  • Ep. 93 Predictive Identity Document Verification
constellations podcast from Kratos

Fascinated by going to Mars?

Right now in Los Angeles a company is 3D printing rockets;  30,000 satellites will be launched in the next five years; satellite communications have advanced so far that companies are using normal cell phones to connect to satellites.  How to keep up with all this excitement?  The Constellations Podcast from Kratos.

Let’s work together

Tell us how you want to grow.

Appear on Federal Tech Podcast

Footer

Social

Follow along on social media.

email

johngilroy@theoakmontgroupllc.com

Policy

Policy for The Oakmont Group

Copyright © 2023 · Business Pro Theme on Genesis Framework · WordPress · Log in