Sysdig continues to evolve this June with main developments in AI-driven safety insights, menace administration, incident response, and securing cutting-edge AI workloads.
Sysdig Sage for Search
Why it issues:
Sysdig Sage for Search brings AI-powered search capabilities to the Sysdig Safe platform, making it simpler for groups to discover cloud assets, belongings, and safety posture findings throughout multi-cloud and Kubernetes environments without having deep technical information of question languages or cloud safety frameworks. It consists of two foremost elements: a SysQL Translation function that converts plain language questions, resembling “What are my EC2 cases with important vulnerabilities?”, into the required SysQL queries, and an Assistant that enhances search outcomes with clear explanations, suggests follow-up questions, and offers steerage for refining queries.
Buyer affect:
This function simplifies safety and DevOps workflows by enabling customers to ask questions in plain language, eliminating the necessity for studying SysQL. It offers unified visibility throughout main cloud platforms (AWS, GCP, Azure), delivering key insights into vulnerabilities, misconfigurations, and compliance dangers. Moreover, it aids in information exploration, revealing relationships between assets and occasions, and provides AI-powered help for deeper evaluation and refined investigations.


Hyperlinks:
Threats: Context-driven correlation with AI-powered insights
Why it issues:
Sysdig’s new “Threats” functionality adjustments how safety incidents are managed. It aggregates a number of associated safety indicators (primarily based on shared entities like Kubernetes workloads or cloud identities, attacker conduct, and time proximity) right into a single, actionable safety incident. Key features of this functionality embrace the inhabitants of Threats within the graph database, enabling clients to correlate them with different findings, resembling figuring out if a CVE has a associated Menace indicating energetic exploitation. Moreover, Menace Administration leverages Sysdig Sage™, our generative AI safety analyst, to complement threats with easy-to-understand summaries and high-fidelity context, supplied Sysdig Sage is enabled.
Buyer affect:
The introduction of Threats results in diminished alert fatigue because the consolidation of associated occasions right into a single “Menace” minimizes noise and helps groups focus. It permits sooner decision-making as a result of AI-enriched summaries and contextual info present higher situational consciousness. Investigative effectivity is enhanced as analysts can shortly grasp the scope of an incident. General, groups can handle alerts extra effectively with streamlined workflows that embrace inline actions like standing adjustments, rule tuning, investigations, and response actions, all from a unified interface.


Hyperlinks:
Response actions: Manually reply to threats with ease
Why it issues:
Responding successfully to occasions typically requires fast motion. Sysdig now empowers safety groups with the power to manually execute important Response Actions immediately from an occasion inside the platform. This enhances present automated coverage actions and investigation instruments by offering quick, reactive capabilities without having to pre-configure each response situation. Out there guide actions embrace container kill, cease, or pause, course of kill, file acquisition for forensic evaluation, and file quarantine. These actions might be reverted the place relevant, providing flexibility throughout an investigation.
Buyer affect:
Safety groups achieve vital benefits, together with the power for quick containment by taking direct motion to isolate compromised containers or quarantining malicious information. Forensic capabilities are enhanced by way of the power to amass information for investigation. This function offers an important reactive toolkit, enabling safety groups to react swiftly to evolving threats primarily based on real-time evaluation. Moreover, Response Actions might be built-in into broader safety workflows by way of public APIs, permitting for coordination with present SOAR platforms.

Hyperlinks:
CSPM assist for Amazon Bedrock: Safe your AI workloads
Why it issues:
Amazon Bedrock is quickly turning into a core constructing block for enterprise AI methods, making strong safety and posture administration for its assets important. Sysdig Safe now closes a major CSPM hole by introducing assist for Amazon Bedrock, permitting organizations to increase their present safety practices to this important AI service. Sysdig Safe can now uncover Amazon Bedrock assets, together with Customized Fashions, Brokers, and Information Bases, throughout linked AWS accounts. It additionally permits groups to outline and consider customized posture controls tailor-made particularly to those Bedrock-based AI fashions, brokers, and information bases.
Buyer affect:
This new functionality permits proactive AI safety, permitting clients to realize essential visibility and management over generative AI workloads to persistently implement safety finest practices. It facilitates customized governance for AI, empowering organizations to create and apply safety insurance policies that align with each inside company requirements and exterior regulatory necessities. In the end, this empowers clients to confidently scale their generative AI initiatives, particularly these in regulated industries, figuring out that safety and compliance are built-in.


Hyperlinks:
Create a Customized Management with Rego
Automations: New triggers for dangers, vulnerabilities, and runtime occasions
Why it issues:
The brand new Automations functionality permits safety groups to outline response workflows for important occasions. Customers can now set off actions primarily based on vulnerability findings, danger exceptions, and runtime occasions, together with automated Jira ticket creation. Triggers might be tailor-made utilizing filters resembling zone, severity, standing, and labels, permitting for extremely personalized alert routing and remediation workflows.
Buyer affect:
Key actions can now be automated, empowering groups to cut back guide effort and speed up incident response with this new function. It helps include threats, escalate findings, and implement governance insurance policies extra effectively throughout complicated environments. Upcoming enhancements will additional prolong these capabilities with assist for threat-based triggers and automatic response actions, enabling end-to-end reactive safety workflows.
