Rezilion

Birmingham, MI, USA
2018
Jul 22, 2021   |  By Artum Zolotushko
As every responsible company does, we too scan our containerized applications for vulnerabilities before deploying them in production. In a recent scan, our security team found 56 high and critical vulnerabilities coming from container base-image and open-source components.
Jul 20, 2021   |  By Rezilion
Rezilion Named Winner in the 6th Annual 2021 American Best in Business Rezilion announced today that The Globee® Awards, organizers of world’s premier business awards programs and business ranking lists, has named Rezilion Prioritize, a winner in the 6th Annual 2021 American Best in Business Awards. The American Best in Business Awards are open to all organizations with at least one or more offices in the United States of America. All organizations operating in the U.S.A.
Jul 14, 2021   |  By Rezilion
The Biden administration recently passed an Executive Order in the wake of another string of costly and embarrassing cyber attacks. Executive Order 14028 Improving the Nation’s Cybersecurity includes many new initiatives designed to share cybersecurity intelligence, modernize federal infrastructure, and improve the traceability and integrity of applications that store and process vital information. The last provision, laid out in Sec.
Jul 8, 2021   |  By Rezilion
Rezilion Receives the Golden Bridge Awards’ Silver Award for Startup of the Year in Security Cloud/SaaS ST. CHARLES, MO; JULY 06, 2021 – Rezilion, a leading autonomous DevSecOps platform, announced today that The Globee® Awards, organizers of world’s premier business awards programs and business ranking lists, has named Rezilion a winner in the 13th Annual 2021 Golden Bridge Business and Innovation Awards.
Jul 8, 2021   |  By Rezilion
Back in the 90s, gaming companies were mainly occupied with physical security and less with cyber threats. With single-player PC games or consoles like Sega, Nintendo, and PS1, the only perceived threat to gaming companies was someone burning CDs or using the notorious modchip that allowed potential customers to use illegal copies of their favorite games. As technology grew more advanced, gaming companies offered their customers a much more robust experience.
Jun 24, 2021   |  By Rezilion
Many things can slow down the development and deployment of a project. But one of the most significant issues is also wholly manageable: Code Bloat. Bloated code occurs where the runtime environment contains useless pieces of code, like libraries or service binaries, that will invariably lead to software inefficiencies and security vulnerabilities.
Jun 2, 2021   |  By Rezilion
The power of two CVEs Most people take it as a given that the gas station down the street will be open and have plenty of gas available, even if the price is higher than they’d like. That assumption was shattered in early May because of two unpatched vulnerabilities in Colonial Pipeline’s network. The attack that crippled the gas supply for the entire east coast didn’t require explosions or forces of nature.
May 19, 2021   |  By Rezilion
Who’s responsible for security? Milton Friedman once said “When everybody owns something, nobody owns it, and nobody has a direct interest in maintaining or improving its condition.” While that quote was about physical buildings 40 years ago, it’s still relevant to how we build software today. The technology required to shift security left exists but the organizational shifts are lagging behind.
Apr 12, 2021   |  By Rezilion
Here are five steps to help ease the burden Security teams are struggling to keep up with the pace of change in modern environments. More than 18,000 vulnerabilities disclosed in 2020 alone with an average mean time to patch of 60 to 150 days. On top of that, recent developments in DevOps enable developers to push code on demand and launch instances in cloud environments as often as the business needs.
Mar 1, 2021   |  By Rezilion
Managing and measuring your security posture is complex Security is difficult in modern environments. The attack surface is exploding, and the pieces are constantly getting smaller. CISOs and operations teams have to maintain and secure environments that can be any combination of on-premise, cloud, containers, serverless, microservices, and kubernetes and are likely doing all of this from home these days.

Rezilion’s autonomous cloud workload protection platform instantly shrinks your attack surface while enabling developers to push code freely.

Rezilion is a stealth mode cyber-security start-up, created by successful serial-entrepreneurs. Rezilion develops a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

Security at Cloud Speed and Scale:

  • Dynamic Whitelisting & Application Control: By statically analyzing CI/CD pipeline artifacts (code repositories, VM and container images repositories, etc.) Rezilion determines the correct state for every production instance and assures that each is behaving exactly as programmed.
  • Hardening & Vulnerability Management: Vulnerabilities, known and unknown, are part of the DevOps life. Unfortunately, they can’t be fixed all at once. Rezilion makes living with vulnerabilities manageable by reducing the vulnerable attack surface — as well as the tension between DevOps and Security teams.
  • Exploit Prevention & Memory Protection: Rezilion continuously assesses the integrity of hosts, virtual machines, and containers; providing broad protection against attacks, without the overhead and complexity of legacy solutions.
  • Change Control & Access Management: Immutability is a shared goal for developers, IT, and security. However, few production environments are completely immutable. Rezilion helps control and document any manual change that bypasses the CI/CD pipeline.

Effortlessly reduce your attack surface.