Aviatrix is proud to announce our new partnership with Wiz, a collaboration that will provide customers with actionable intelligence and rapid threat response in single-, hybrid, and multicloud environments. As Wiz’s recent acquisition by Google shows, their solution’s renowned ability to rapidly detect cloud risk and compromised cloud workloads has made it a formidable weapon against cyberattacks.

This integration pairs Wiz security capabilities with Aviatrix’s Cloud Firewall for network-wide policy enforcement and control. Wiz security finds critical vulnerabilities; Aviatrix acts before threat actors can exploit them. Together, they stop attackers mid-play — not after the breach hits your board deck.

Today’s attackers move faster than your firewall rules. If your security ecosystem isn't working together, then your cloud is already exposed. That’s why Aviatrix is teaming up with Wiz — to give security teams both clarity and control.

As partners, Aviatrix and Wiz cloud security equip organizations to:

  • Uncover network risks

  • Review the context and scope of each threat

  • Enforce security policies to neutralize the threat

Here's how this partnership delivers essential cloud network security:

Runtime Security with Aviatrix and Wiz

  • Wiz’s intelligent insights help security teams sift through an overwhelming cloud footprint full of opportunity for attackers, prioritizing the greatest risks and flagging vulnerable assets. Their solution highlights toxic combinations that leave your network exposed, such as public-facing workloads with known CVEs.

  • Aviatrix implements zero trust at an architecture level by providing network segmentation, consistent security policies, and Internet filtering to address threats. Aviatrix can act quickly to mitigate threats and address vulnerabilities.

Together, they provide closed-loop between out-of-band detection, and runtime securityin-line enforcement of behavior on the network to stop attacks before they start, even if you can’t patch, and immediately mitigate attacks in progress.

As I recently explained on the Inside Analysis podcast, runtime security is a foundational and critical part of an organization’s security posture. It provides behavior data, defense in depth and compensating controls when security hygiene falls short. Network runtime security operates as both the data source for observability as well as the enforcer of security policies.

The closed feedback loop between visibility and enforcement helps organizations implement a zero trust posture. It is important because it helps you spot anomalies that represent active threats and actively stop a breach.

With Aviatrix and Wiz cloud security, a DevSecOps team can observe the cloud landscape, and prioritize the most important places to implement network runtime security controls.

Here’s why runtime security is critical. There are only three runtime security controls in cybersecurity:

  1. Endpoint agents – Agents that guard endpoints. EDR, XDR, and CrowdStrike provide this type of security control.

  2. Network security – Network guardrails like traditional firewalls.

  3. Identity – Identity authentication controls like multi-factor authentication that allow only authorized users to access an organization’s systems.

In the cloud, we have a huge problem with two of those controls:

  1. Endpoint agents – Now, you can install agents everywhere – they’re platform-as-a-service. When you install agents everywhere, you lose your visibility and your control point.

  2. Network security – Often, security teams don’t have firewalls because firewall vendors didn’t reinvent their architectures for the cloud.

  3. Identity – Instead of having a defense-in-depth solution with endpoint agents, network security, and identity, organizations are left with only being able to control network security posture through identity. Trying to enforce security just through identity becomes like a nightmare of responding to a growing number of alerts with little visibility, control, or ability to prioritize.

Part of Wiz’s value is teaching you to interpret, prioritize, and address the most urgent threats in your network. With the Aviatrix-Wiz cloud security partnership, you’ll receive both that invaluable threat intelligence and the ability to respond with rapid security policy enforcement.

We’ve built a closed loop feedback mechanism where Wiz security can detect something, and we can enforce it – in other words, runtime security. Because you have to be in the runtime to stop a breach.

Securing the Multicloud

Another aspect of the value of this partnership is its flexibility. Whether you operate in a single cloud, hybrid, or multicloud environment, Aviatrix and Wiz cybersecurity provide network-wide, centralized visibility and control.

As one of our Cloud Networking Heroes, Ansley Moyo, pointed out about Google's planned acquisition of Wiz, the acquisition signals that “Major cloud service providers are finally embracing multicloud. This is important because CSPs have realised that customers are moving away from a traditional single-cloud approach where they deploy all their infrastructure within the same CSP, but rather distribute it across different clouds, leveraging the strength of each. That approach affects the security of resources as the need for distributed cloud security emerges.”

This shift to the multicloud creates a space that needs a new security solution. “With Wiz identifying risks and Aviatrix applying network-level protections, businesses can achieve security that keeps pace with our cloud innovation,” Ansley said.

Multicloud deployments empower organizations to use the storage, connectivity, and cost options of multiple clouds – but can quickly become complicated and riddled with gaps without a comprehensive, holistic solution. Together, Aviatrix and Wiz security provides that simplified, scalable solution no matter how many clouds or edge sites your network covers.

How it Works: Under the Hood of the Aviatrix-Wiz Security Partnership

Here’s how the Aviatrix and Wiz partnership works. Let’s say an EC2 instance in your network becomes compromised:

  1. Wiz’s agentless scanning detects a possible threat in that EC2 instance.

  2. Wiz’s automation triggers a webhook handler, which parses the request and automatically creates firewall policies on the Aviatrix Controller.

  3. The Aviatrix Controller pushes the new security policies to the Aviatrix Cloud Firewall.

  4. The Aviatrix Firewall blocks all traffic coming to or from the compromised EC2 instance.

The threat has been dealt with using minimal human intervention – without long ticket queues, ACL (access control list) edits, or network downtime.

With so many potential and actual threats to enterprise networks, organizations need visibility into all traffic flows, a way to prioritize based on which alerts matter most, and the power to enforce security policies quickly. Aviatrix and Wiz cloud security provide the clarity and control to protect your digital assets.

Ready to transform cloud visibility into action?

Chris McHenry
Chris McHenry

Chief Product Officer

Chris helps customers solve the new and unique challenges of networking within and between multiple clouds. He is an expert in cloud network security, multicloud networking, cloud cost management, zero trust networking, and microsegmentation.

PODCAST

Altitude

subscribe now

Keep Up With the Latest From Aviatrix

Cta pattren Image