Same here, I guess it's the circles you run. I just went to their homepage and I have no idea what they do. I already have CI/CD, code, etc.. "securing" it seems like, use aws secret stores?
In other words, their webpage is not telling me anything. Companies like these, always feel like instead of having a useful product, they hired useful networks of people to "spread the word" and sell sell sell to your network. Apparently I wasn't in the network. Sorry old and salty.
Companies have problems securing their workloads. Not just storing secrets. Off the top of my head, I've personally been able to centralize the following with a single tool (instead of gluing together a dozen different providers)
- scan cloud configurations for policy violations
- detect and remediate infrastructure misconfigurations
- real-time visibility into cloud resource inventories
- early detection of issues
- container vuln. scanning
- runtime anomalous behavior
- alerts and correlate security events
- compliance mappings
- id risky permissions in IAM policies
- track changes and configuration drift over time
- implement zero-trust policies across microservices
- eforce network seg in containerized environments
- run security checks during build and deploy stages
- vulnerability assessments on running VMs and containers
- policy-as-code for consistent security standards
In other words, their webpage is not telling me anything. Companies like these, always feel like instead of having a useful product, they hired useful networks of people to "spread the word" and sell sell sell to your network. Apparently I wasn't in the network. Sorry old and salty.