❗ Important
Our Cloud services are being updated in stages. If you do not see the updates mentioned here yet, they will be available in your region soon. To know more, see Druva Cloud Upgrade Process.
January 03, 2025
Enhancement
Refreshed Cyber Resiliency User Interface
The Cyber Resiliency user interface is now redesigned to provide a seamless experience. Furthermore, the Security Center dashboard is refreshed to display critical information and advanced threat summary details in a consolidated view, enhancing accessibility to key insights. Here are some of the key enhancements:
1. Categorization of Cyber Resiliency Features
The features are rearranged on the Global Navigation Bar to simplify navigation ensuring streamlined access to the required information.
The Posture and Observability section will have the following features:
Access Events
Data Anomalies
Rollback Actions
The Ransomware Recovery section will have the following features:
Quarantine Bay
Curated Snapshots
Restore Scan
Threat Hunting
2. Renamed below Cyber Resiliency Features
The features are relabelled more accurately representing its functionality and purpose.
Security Command Center to Security Center
Security Events to Access Events
Unusual Data Activity (UDA) to Data Anomalies
📝 Note
The Unusual Data activity functionality under the Security Events is now moved to a separate module under the Posture and Observability section.
December 19, 2024
New Feature
Introducing Threat Hunting for AWS Workloads (EC2 and EBS Volume)
We’re excited to introduce Threat Hunting, a powerful new feature that enhances the security posture and assists in improving security operations and incident response workflow.
Our comprehensive approach lets you actively search for and address threats hiding in your backed-up data. With Threat Hunting, you can quickly isolate, analyze, and neutralize threats, stopping infections from returning to your production environment.
Threat Hunting helps you have a unified view of threats—and you can define the scope of resources, adjust scan depth, set IOC parameters, and even decide how often to run threat hunts, whether proactively or on-demand.
Here’s what you can expect from this latest update:
Key Features:
Malware IoC Search: Efficiently hunt for malware Indicators of Compromise (IoCs) within your AWS Workloads (EC2 and EBS Volume) air-gapped backups. Quickly identify and assess potential threats
Infection Scope and Timelines: Gain insights into the scope of the infection and timelines
Rich Metadata: Use the rich metadata presented in Threat Hunting results to aid investigation and incident response workflows
Customer Action Required: Contact sales or support to procure the Threat Hunting for AWS Workloads (EC2 and EBS Volume) license.
For more information, see Get Started with Threat Hunting.
November 21, 2024
This release has minor bug fixes.
November 07, 2024
This release has minor bug fixes.
October 24, 2024
This release has minor bug fixes.
October 10, 2024
ENHANCEMENT
Support for SHA-256 and MD5 file hashes in Threat Hunting
With evolving security needs, we have broadened our support for file hash formats.
Key enhancements:
Custom file hash support: Users can now input file hashes in SHA-256 and MD5 formats in addition to the existing supported SHA1 format for threat hunting.
Automatic SHA1 processing: For every SHA-256 and MD5 hash provided, the system will attempt to find the corresponding SHA1 hash on a best-effort basis.
While SHA1 is still the recommended format for optimal results, this update offers greater flexibility by allowing the use of SHA-256 and MD5 hashes.
Customer Action Required: None
For more information, see Create a new threat hunt.