Uptycs Unified CNAPP & XDR
If you’re struggling with a lack of transparency in your security stack, and questions like, “What containers in my environment are running this known vulnerable package?” or “How many servers have had the password rotated in the last 90 days?” Uptycs gives you the ability to get all the answers from the same console. With unified observability across endpoints, systems, providers and more, Uptycs empowers your security teams with actionable answers to close security observability gaps across your organization.
One UI and Data Model - Multiple Solutions
Uptycs Unified CNAPP and XDR is built for modern defenders who have a charter to close security observability gaps across their cloud-native infrastructure. Uptycs is composed of:
-
Telemetry sourced from across the cloud-native attack surface
- A powerful analytics engine and data pipeline
- Data summarizations and visualizations that solve for multiple solutions including CLoud Workload Protection (CWPP), Cloud Security Posture Management (CSPM), eXtended Detectino and Response (XDR), Insight, Inventory and Audit, Compliance and Governance.
Click components of the diagram below to explore Uptycs CNAPP and XDR further.
Endpoints
Cloud-native security starts with modern productivity (laptops) and production (cloud-based servers) endpoints. Uptycs gives you unprecedented observability across your macOS, Linux, and Windows endpoints — both via laptops and servers. Our offerings give you insight and visibility into your entire fleet, as well as the ability to extend capabilities to compliance, detection, and investigation. Choose the right level of functionality for your needs.
Learn MoreServers
The workflows and threat exposure of servers are quite different from laptops and desktops, necessitating a purpose-built solution for Linux and Windows servers. Uptycs is trusted to secure large-scale server workloads at some of the most demanding organizations because of its robust server workload visibility. Even obscure Linux distributions—like RHEL 5—are supported with a modern agent that uses eBPF to extract Linux system telemetry. The osquery-based sensor streams telemetry to the Uptycs Security Analytics Platform via a secure TLS connection where third-party threat intelligence, behavioral baselines, and lambda analytics are applied to monitor for threats, misconfigurations, and vulnerabilities.
Learn More
Containers & Kubernetes
As organizations adopt new processes and technologies for building and running applications, they require new types of security observability. Uptycs equips modern defenders with the functionality to protect container-based applications, whether run on-premises, or in the cloud — on a VM or in a serverless deployment. With Uptycs, you identify vulnerabilities early in the process, verify secure configurations, ensure compliance, and continuously monitor in production.
Learn MoreCloud Providers
The most important way to improve cloud security posture is to ensure resources are configured correctly. It’s a task that can be difficult without visibility across cloud accounts. With Uptycs, IT and security teams can inventory cloud assets and resources, identify non-compliant resources, and access evidence needed for remediation — and more . Uptycs also analyzes cloud activity logs and flow logs so that you can enforce least-privilege policies, detect threats, and investigate incidents.
Learn MoreSaaS Providers - Coming Soon!
GSuite, Office 365, SalesForce, GitHub, GitLab, DropBox and the list goes on. Simply put, today's business applications run in the cloud. They can tell a valuable story about who is accessing what, and where sensitive data is being stored or shared making visibility into these applications mission critical for security. Coming soon, saasquery will provide this layer of telemetry in the Uptycs Security Analytics Platform.
Identity Providers - Coming Soon!
Identity and authorization management is the modern equivalent to the firewall, preventing malicious actors from accessing systems and data. Coming soon - identity query will provide the required insight into user and authorization data for GoogleAuth, Office 365, Okta, PingIdentity, Auth0, and more.
Cloud Workload Protection Platform
With the Cloud Workload Protection Platform (CWPP), Uptycs offers complete security observability for your cloud workloads and collects and analyzes real-time workload activity in detail; this is true for hosts, VMs, containers, microVMs, and serverless functions and the cloud infrastructure and orchestrator telemetry that acts as the control plane for these cloud-native applications.
Learn More
Cloud Security Posture Management
The Shared Responsibility Model means your cloud service provider is responsible for infrastructure security — and you’re expected to secure applications and data. Gartner predicts that through 2025, 99% of cloud security failures will be the fault of the customer, largely due to misconfigurations. Uptycs’ cloud security posture management (CSPM) solution simplifies hardening your cloud attack surface and enforcing best practices, like those defined by the CIS Benchmarks.
Learn MoreeXtended Detection & Response
Rich, meaningful connected insights are more powerful than discrete alerts from niche tools. All security tools generate alerts — but only Uptycs eXtended Detection and Response (XDR) streamlines telemetry across modern attack surfaces and gives you comprehensive detection and response capabilities. Correlated telemetry from productivity endpoints, server workloads, cloud infrastructure, and other sources provide extended detection and response.
Learn MoreInsight & Inventory
There’s a good reason that inventory and control of hardware and software assets are some top recommended security controls. Uptycs equips IT and security teams with the ability to not only inventory assets, but also to understand security posture. With Asset Insight and Inventory, you can quickly answer questions like: “Which users have shell access?” “What startup items are unique to this machine?” or “Which machines are running this vulnerable software?”
Learn MoreAudit, Compliance & Governance
Managing your organization’s IT security governance and compliance plan has never been more challenging. Uptycs offers a new, simplified, highly scalable approach to security auditing, compliance and risk management that: 1. addresses today's operating complexity and 2: gives teams time back so they can focus on strategy. With the Uptycs security analytics platform, you can get accessible security telemetry and continuous compliance for endpoints, the cloud, and cloud workloads.
Learn MoreThe Power of Structured Telemetry: How Our Data Pipeline Works
With the relevant query-based sensors and collectors in place, Uptycs Unified CNAPP and XDR immediately begins ingesting and analyzing telemetry — normalized in a tabular format — and gives you connected insights across all of your asset classes in the same place. Uptycs Unified CNAPP and XDR can be visualized as a data engineering pipeline with three stages; collect, aggregate, and analyze.

Collect
Collection Stage
In the collection stage, telemetry is captured via agent deployment to the host (osquery) or via native API integrations (kubequery, cloudquery) and transferred to Uptycs backend using an HTTP TLS connection. The telemetry can be bucketed into two broad areas based on the attack surface:
-
First Grouping: based on osquery’s ability to interface with operating system interfaces such as kaudit, eBPF on Linux, ETW on Windows, and OpenBSM or the security API framework on macOS. Osquery uses these interfaces to collect system call behavior and translate it into a tabular JSON format.
-
Second Grouping: cloudquery and kubequery use native API integrations to ingest data and translate it into a structured table format.
The tabular telemetry can be acted upon while it’s streaming — for real-time correlation and alerting — and once it's been aggregated and stored for reporting and ad hoc historical querying.

Aggregate
Aggregation Stage
The aggregation stage is where Uptycs’ speed and scale truly shines. Our eXtended Detection Network (XDN) applies scaling techniques, such as consistent hashing for horizontal scaling based on HTTP and TLS load balancing techniques to reliably spread the load and ingestion of the data. Uptycs backend can concurrently ingest a wide variety of structured telemetry from multiple interfaces. The XDN also facilitates cohort analysis.
-
Example: telemetry is in flight from a cohort of 1,000 database servers, and anomalous behavior is identified on one of the machines. The anomalous behavior on the single machine is converted into a real-time query that then evaluates the other 999 machines.

Analyze
Analysis Stage
In the analysis stage, Lambda analytics are used to analyze data while it’s in- flight for near real-time correlation. While in-flight, Uptycs correlates data with a variety of open source threat intel databases and independent research findings from the Uptycs Threat Research Team. Data is partitioned as a function of time and compressed so that the telemetry can be analyzed at scale.
- This streaming analytics model allows Uptycs to take each row of structured data and correlate it using event and alert rules to generate signals. Billions of pieces of telemetry are narrowed to thousands of signals.
- These signals are correlated into tens of detections, making it possible for humans and automation to see insights and make data-driven decisions as a part of a compliance requirement.

Collect
Collection Stage
In the collection stage, telemetry is captured via agent deployment to the host (osquery) or via native API integrations (kubequery, cloudquery) and transferred to Uptycs backend using an HTTP TLS connection. The telemetry can be bucketed into two broad areas based on the attack surface:
-
First Grouping: based on osquery’s ability to interface with operating system interfaces such as kaudit, eBPF on Linux, ETW on Windows, and OpenBSM or the security API framework on macOS. Osquery uses these interfaces to collect system call behavior and translate it into a tabular JSON format.
-
Second Grouping: cloudquery and kubequery use native API integrations to ingest data and translate it into a structured table format.
The tabular telemetry can be acted upon while it’s streaming — for real-time correlation and alerting — and once it's been aggregated and stored for reporting and ad hoc historical querying.

Aggregate
Aggregation Stage
The aggregation stage is where Uptycs’ speed and scale truly shines. Our eXtended Detection Network (XDN) applies scaling techniques, such as consistent hashing for horizontal scaling based on HTTP and TLS load balancing techniques to reliably spread the load and ingestion of the data. Uptycs backend can concurrently ingest a wide variety of structured telemetry from multiple interfaces. The XDN also facilitates cohort analysis.
-
Example: telemetry is in flight from a cohort of 1,000 database servers, and anomalous behavior is identified on one of the machines. The anomalous behavior on the single machine is converted into a real-time query that then evaluates the other 999 machines.

Analyze
Analysis Stage
In the analysis stage, Lambda analytics are used to analyze data while it’s in- flight for near real-time correlation. While in-flight, Uptycs correlates data with a variety of open source threat intel databases and independent research findings from the Uptycs Threat Research Team. Data is partitioned as a function of time and compressed so that the telemetry can be analyzed at scale.
- This streaming analytics model allows Uptycs to take each row of structured data and correlate it using event and alert rules to generate signals. Billions of pieces of telemetry are narrowed to thousands of signals.
- These signals are correlated into tens of detections, making it possible for humans and automation to see insights and make data-driven decisions as a part of a compliance requirement.
Explore Uptycs Unified CNAPP & XDR
Watch these short videos to see how Uptycs provides security observability across modern attack surfaces.
Cloud Infrastructure
Improve Your Cloud Security Posture
In this 2-minute video, see how IT and security teams gain instant insights for their entire cloud estate; inventory cloud assets and resources, identify non-compliant resources, and access evidence needed for remediation. Uptycs also analyzes cloud activity logs and flow logs so that you can enforce least-privilege policies, detect threats, and investigate incidents.
Containers & Kubernetes
Secure Your Containers & Kubernetes Environments
New technology needs a new kind of security. Watch this 2-minute video to explore how our unified CNAPP and XDR equips security and DevOps teams with the visibility they need at build time, runtime and while in production.
Endpoints & Servers
Unprecedented Observability for macOS, Linux, and Windows Fleets
Cloud-native security begins with modern productivity (laptops) and production (cloud-based servers) endpoints. With Uptycs, you’ll gain insight and visibility into your entire fleet, as well as the ability to extend those capabilities to compliance, detection, and investigation. See how in this 3-minute video.
Cloud Infrastructure
Improve Your Cloud Security Posture
In this 2-minute video, see how IT and security teams gain instant insights for their entire cloud estate; inventory cloud assets and resources, identify non-compliant resources, and access evidence needed for remediation. Uptycs also analyzes cloud activity logs and flow logs so that you can enforce least-privilege policies, detect threats, and investigate incidents.
Containers & Kubernetes
Secure Your Containers & Kubernetes Environments
New technology needs a new kind of security. Watch this 2-minute video to explore how our unified CNAPP and XDR equips security and DevOps teams with the visibility they need at build time, runtime and while in production.
Endpoints & Servers
Unprecedented Observability for macOS, Linux, and Windows Fleets
Cloud-native security begins with modern productivity (laptops) and production (cloud-based servers) endpoints. With Uptycs, you’ll gain insight and visibility into your entire fleet, as well as the ability to extend those capabilities to compliance, detection, and investigation. See how in this 3-minute video.