Back to all posts
Gartner CNAPP-d
Research

2025 Gartner® Market Guide for Cloud-Native Application Protection Platforms: 5 Takeaways That We Believe Matter

Gartner has released the 2025 CNAPP Market Guide. According to Gartner: “​​while numerous providers exist, only a handful offer a comprehensive platform with the required breadth and depth of functionality, particularly emphasizing seamless integration through the development and operations processes.” We believe that Upwind’s inclusion in this group of vendors is a significant milestone. To […]

upwind-Cloud-Scanners-2-0
Product

Upwind Cloud Scanners 2.0 Redefine the Cloud Security Standards. Now 10X Faster, 93% Leaner.

Cloud Security should be effortless to deploy, seamless to operate, and architected for maximum efficiency. We are excited to announce that we have made groundbreaking technological advancements to Upwind Agentless Cloud Scanners — the technology that powers Upwind Agentless and Sensor-based scanning — resulting in industry-leading performance and accuracy. Starting today, Upwind Scanners 2.0 are […]

Gen-AI-Runtime-v4 (1)
White Paper

Why Securing AI Workloads Demands Runtime Protection, Now More Than Ever

As enterprises race to integrate GenAI and AI-powered applications, security leaders are confronting a new class of threats. Traditional tools weren’t built for the dynamic, high-risk nature of AI workloads. AI workloads introduce new capabilities, along with new risks. They dramatically increase the cloud attack surface by running code that adapts in real time, often […]

DSPM-revised
Product

Upwind Eliminates Data Blind Spots by Detecting and Securing Sensitive Data Across Cloud Environments

Upwind now offers Data Security features and context that simplify compliance, improve visibility, and protect sensitive data across your cloud environments.  These capabilities continuously monitor and enable data security across multi-cloud storage – supporting automated discovery, visibility, and compliance from a single platform. Key capabilities include: These new capabilities mark a significant advancement for security […]

G-145 CI:CD Pipeline Security Explained

CI/CD Pipeline Security Explained

The Continuous Integration/Continuous Delivery or Deployment (CI/CD) pipeline integrates and tests code changes, often multiple times per day. And it automatically prepares code for release, sometimes automatically pushing code changes all the way to production without manual intervention. Practicing CI/CD today means faster delivery, more updates, and happier customers, all with fewer errors.  But it […]

G-138 What Is Unified Security Posture Management (USPM)?

What Is Unified Security Posture Management (USPM)?

Security posture isn’t all about misconfigurations, but can span thousands of combined moving parts across cloud workloads, identities, and SaaS applications, APIs, endpoints, and even AI pipelines.  The problem?  Everyone sees a slice of the total environment, but no one sees the whole. Most organizations plug visibility holes in their environments first with fragmented tools […]

G_135_Understanding_Breakout_Time_The_Critical_Race_in_the_Cloud

Understanding Breakout Time: The Critical Race in the Cloud

Attackers access cloud systems through vulnerabilities like misconfigured Identity and Access Management (IAM) roles, public buckets, or exposed secrets. But they don’t stay in those initial entryways for long. The time it takes cyberattackers to “breakout” of their initial locations and move laterally across a cloud system is called “breakout time.” And it shapes cyberdefense […]

G-123 What is Identity Threat Detection and Response (ITDR)?

What is Identity Threat Detection and Response (ITDR)?

First, there were perimeters. The idea gradually gave way to endpoints, but today, identities are often the first point of entry to vast, diverse cloud systems. They’re enablers of lateral movement, pivot points in cloud and SaaS environments, that hold the keys to the rest of the environment. In other words, identities deserve attention. In […]

1st_place_cnapp_showdown_-_overall_winner-2025-2048x1229
Company News

Upwind Wins Big at Cloud Security Showdown Hosted by Tamnoon & Analyst James Berthoty

Big win for Upwind: We took home the overall title and earned top honors across every category at the Tamnoon Cloud Security Demo Showdown on June 5th. Upwind placed in the top three for all four categories of the people’s choice categories: Application Security, Cloud Security Posture Management (CSPM), Runtime Security, and Vulnerability Management. These […]

Configuration Reporting
Product

Upwind Simplifies Compliance with Real-Time Configuration Reporting

We are excited to announce a new enhancement to Upwind’s posture capabilities, with Upwind now providing comprehensive executive-level Configuration Reports. Users can now generate and download configuration reports, powered by live runtime data, directly from the UI. These reports deliver clear, actionable summaries of posture risk and misconfiguration findings, making it easier for security leaders […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.