Skip to content
Knowledge base Updated: February 5, 2026

Protecting modern applications: Radware Cloud Native Protector features

Wondering how to effectively secure applications in cloud environments?

The world of applications is constantly evolving, moving from traditional server rooms to dynamic, distributed public cloud environments. Architectures based on microservices, containers and serverless features offer unprecedented flexibility and scalability, but at the same time introduce entirely new and complex security challenges. Managing configuration, controlling permissions, protecting against sophisticated attacks and ensuring compliance in these fluid, multi-cloud ecosystems requires a new approach - a cloud-native approach. Traditional tools, often adapted from the on-premise era, simply can’t keep up. It is in response to this need that Radware Cloud Native Protector (CNP) was created - a comprehensive platform designed from the ground up to protect modern applications and infrastructure in their native cloud environment. At nFlo, we understand that the future belongs to cloud native applications and their security is key, so we are bringing you a solution that offers intelligent and integrated protection for this new era.

Shortcuts

What is Radware Cloud Native Protector and what problems does it solve?

Radware Cloud Native Protector is an integrated Cloud Native Application Protection Platform (CNAPP) that combines the key features needed to protect modern applications and infrastructure in the public cloud. Think of it as a comprehensive defense system for your digital city in the cloud that not only patrols the streets and walls (network and load protection), but also checks building plans (security posture management) and controls who has the keys to each door (privilege management).

CNP addresses a number of fundamental problems facing organizations in the cloud. First and foremost, it addresses the lack of visibility and control in complex, often multi-cloud environments by providing a centralized view of all resources and their security status. Effectively combats the scourge of misconfigurations (misconfigurations), which are a major cause of breaches in the cloud. Helps control the chaos of privilege management (excessive permissions), which creates huge risks. Provides advanced protection against threats, including zero-day attacks and malware targeting cloud workloads. It also makes it easier to maintain compliance with regulations and security standards in a dynamic cloud environment.

📚 Read the complete guide: Cloud Security / AWS: Bezpieczeństwo chmury publicznej - AWS, Azure, best practices

What threats to public cloud applications does Radware identify?

Radware, drawing on its years of security experience and analysis of the global threat landscape, identifies a number of key risks specific to applications and infrastructure in the public cloud. The Cloud Native Protector platform is designed to counter just these risks. These primarily include configuration errors in cloud services, such as publicly accessible data stores, unsecured databases or overly open network rules, which are easy targets for attackers. Another critical area is excessive or misconfigured IAM privileges, which, if an account is compromised, can allow an attacker to escalate privileges and access sensitive resources.

Radware also highlights attacks that exploit vulnerabilities in the cloud workloads themselves (virtual machines, containers), including zero-day attacks. Attacks on APIs, which are the lifeblood of modern applications, and DDoS attacks targeting cloud-based applications are also a significant threat. Not to forget the risk of data theft (data exfiltration) and regulatory non-compliance threats. Cloud Native Protector was built to comprehensively address these multidimensional risks.

How does Radware Cloud Native Protector provide multi-layered protection?

The strength of Radware Cloud Native Protector lies in its integrated, multi-layered approach to security, which encompasses various aspects of protection within a single platform. Instead of relying on a single mechanism, CNP combines several key pillars:

  • Cloud Security Posture Management (CSPM): Continuously monitor cloud resource configurations for errors, non-compliance with best practices and compliance standards.

  • Cloud Infrastructure Entitlement Management (CIEM): Analyze and optimize IAM permissions to eliminate excessive accesses and enforce the principle of least privilege.

  • Cloud Workload Protection (CWPP - elements): Threat detection and protection against malware running inside VMs, containers and serverless functions (although CNP focuses more on visibility and context than full EDR-style endpoint protection).

  • Network threat detection and response (NDR - elements): Monitor network traffic in the cloud for anomalies, suspicious communications and signs of attacks.

  • Threat intelligence: Using Radware’s global threat database to identify known malicious actors, IP addresses and attack patterns.

Combining these layers within a single platform provides deeper visibility, better event correlation and more effective, contextual protection than using separate, point solutions.

How does the agentless deployment of Radware Cloud Native Protector work?

One of the key advantages of Radware Cloud Native Protector is its agentless architecture. This means that the platform does not require any additional software (agents) to be installed on protected virtual machines, containers or other cloud resources. Instead, CNP uses native APIs from public cloud providers (e.g. AWS API, Azure API, GCP API) to collect the necessary configuration data, logs and telemetry metrics.

Once a cloud account is connected to the CNP platform (by securely granting the appropriate read-only permissions), the system automatically discovers all resources and begins monitoring and analyzing them continuously. This agentless approach brings significant benefits: it simplifies and accelerates deployment, eliminates the need for agent lifecycle management, does not affect the performance of protected workloads (it does not consume their CPU/RAM resources), and provides broad and immediate coverage of all resources in the environment, including those dynamically created and deleted.

What are the key features of cloud security posture management (CSPM)?

Cloud Security Posture Management ( CSPM) is at the core of Radware’s Cloud Native Protector functionality. The platform offers a number of key capabilities in this area. First of all, it provides continuous visibility and inventory of all resources in multi-cloud environments. It then continuously scans the configuration of these resources, comparing it against an extensive database of security best practices (e.g., CIS Benchmarks) and the requirements of key regulations and standards (PCI DSS, HIPAA, NIST, ISO 27001, RODO).

The system automatically identifies and prioritizes any misconfigurations, security gaps and incompatibilities, presenting them in a clear interface along with a risk assessment and remediation recommendations. A key feature is also the ability to automatically remediate some of the detected issues, allowing for the quick restoration of a secure and compliant configuration. The whole is complemented by advanced reporting capabilities that facilitate audits and communication of the state of security in the organization.

How does Radware detect and eliminate excessive permissions in a cloud environment?

Entitlement control (CIEM functions - Cloud Infrastructure Entitlement Management) is another key pillar of Radware CNP. The platform takes an intelligent approach to identifying and eliminating risks associated with excessive or incorrect IAM permissions. The system analyzes not only assigned roles and policies, but also the actual use of those permissions by users, groups and services in the cloud environment.

As a result, it can pinpoint privileges that have been granted but are never used (redundant privileges), and those that are much broader than necessary for a given task (violation of the principle of least privilege). It also identifies risky privilege combinations and potential privilege escalation paths. Based on this analysis, Cloud Native Protector provides specific recommendations for limiting privileges and can monitor privilege usage in real time, alerting you to attempts to use unsafe or excessive accesses. This proactive privilege management significantly reduces the attack surface associated with compromised identities.

How does Cloud Native Protector’s threat detection and incident response work?

In addition to managing the security posture, Radware CNP also offers advanced capabilities for detecting active threats and responding to incidents in the cloud environment. The platform correlates data from a variety of sources - network logs (e.g., VPC Flow Logs), API activity logs (e.g., CloudTrail), cloud service logs, and configuration and privilege information - to identify suspicious patterns and behavioral anomalies that may indicate an ongoing attack.

It uses AI and machine learning algorithms to detect unusual activity, such as attempts to access sensitive data, unusual network communications (e.g., with known C&C addresses), suspicious API call sequences or signs of lateral traffic. Detected events are automatically correlated and prioritized, and then presented as readable incidents in the management console, along with the context and information needed for investigation. Importantly, the platform enables the definition of automatic response rules that can trigger corrective actions (e.g., isolating a resource, blocking an IP address, revoking permissions) immediately after a critical incident is detected, significantly reducing response time.

Summary: Key Benefits of Radware Cloud Native Protector

  • Full multi-cloud visibility: a single dashboard to manage security for AWS, Azure, GCP and more.

  • Compliance automation: Continuous monitoring and reporting against major regulations and standards.

  • Elimination of misconfigurations: Proactive detection and automatic repair of configuration errors.

  • Entitlement Management (CIEM): Identify and reduce excessive privileges in the cloud.

  • Real-time threat detection: Behavioral analysis and event correlation to identify attacks.

  • Automated response: Quickly neutralize threats and fix vulnerabilities with automated playbooks.

  • Agentless deployment: Easy to implement and no impact on the performance of protected resources.

What are the benefits of centralized security management in multi-cloud environments?

The use of multiple public cloud (multi-cloud) platforms is becoming increasingly common, but brings with it the challenge of managing security in a consistent and efficient manner. The centralized management that Radware Cloud Native Protector offers brings great benefits in this context. First of all, it provides unified visibility - administrators have a single dashboard from which they can monitor the security status of all their resources, whether they are running on AWS, Azure or GCP.

This enables the definition and enforcement of consistent security and compliance policies across a heterogeneous environment, eliminating the risk of vulnerabilities arising from differences between platforms or errors when manually managing each cloud separately. Central correlation of events and alerts from different clouds enables faster detection of complex attacks spanning multiple environments. It also simplifies reporting and auditing by providing consolidated data from the entire cloud infrastructure. Finally, it reduces the operational complexity and costs associated with the need to own and manage separate security tools for each cloud platform.

How does Radware support compliance with regulations and security standards?

Radware Cloud Native Protector is a powerful tool that supports organizations in achieving and maintaining compliance with key cloud security regulations and standards. The platform includes built-in, predefined rulesets (compliance bundles) that map the requirements of standards such as PCI DSS, HIPAA, SOC 2, ISO 27001, NIST CSF and RODO (GDPR) regulations to specific technical controls in AWS, Azure and GCP environments.

The system constantly monitors the configuration of resources for compliance with these rules, automatically identifying any deviations. The results are presented in dedicated compliance reports that clearly show the status of individual requirements and provide evidence for audits. Automatic remediation functions can help quickly fix any non-compliance detected. In addition, CNP’s data protection, access control and logging mechanisms support the implementation of other key requirements of these regulations. As a result, Cloud Native Protector significantly simplifies and automates the compliance process in the cloud.

How does Cloud Native Protector integrate with AWS and Microsoft Azure?

As already mentioned, Radware Cloud Native Protector is designed to integrate deeply and natively with leading public cloud platforms, including Amazon Web Services (AWS) and Microsoft Azure. This integration is mainly done by securely leveraging the official APIs of these platforms.

On the customer side, the integration process typically involves creating a dedicated IAM role (in AWS) or application/service (in Azure) with appropriate permissions (usually read-only, e.g. SecurityAudit in AWS, Reader in Azure, plus additional permissions for remediation functions) and configuring a trust relationship with the Radware service account. Then, in the Cloud Native Protector console, the customer provides the necessary identifiers (e.g., role ARN, subscription/application ID) to allow the Radware platform to securely connect and retrieve data from its cloud environment.

With this API integration, CNP can automatically discover resources, retrieve configuration data, read logs (e.g. CloudTrail, Azure Activity Log) and, if configured, perform remediation actions (e.g. modify security groups, IAM policies). This native integration ensures smooth operation and full use of the platform’s capabilities without the need to install agents.

What sets Radware’s approach to protecting cloud infrastructure apart from the competition?

Radware’s approach to cloud protection, as implemented by Cloud Native Protector and other solutions, is distinguished by several aspects. First and foremost, Radware places a strong emphasis on combining security posture management (CSPM) with advanced threat detection and response, often in a single, integrated platform (CNAPP approach). Many competing CSPM solutions focus mainly on configuration and compliance, offering limited capabilities to detect active attacks.

Radware is leveraging its years of experience and deep expertise in DDoS attack protection and application security, bringing these competencies to the cloud world. Their AI-based behavioral algorithms are often seen as very mature and effective. Cloud Native Protector’ s agentless architecture is also an important differentiator, simplifying deployment and eliminating performance impact. Finally, integration with other Radware products, such as DDoS protection and WAF, creates a cohesive ecosystem of comprehensive protection.

How does Radware combine positive and negative security models in application protection?

While Cloud Native Protector focuses mainly on infrastructure security (CSPM, CIEM) and threat detection at the network and log level, Radware as a whole takes a hybrid approach to application protection, combining positive and negative security models, especially in its WAF solutions (such as AppWall and Cloud WAF Service, which can work complementary to CNP).

  • The negative model relies on signature databases of known attacks. It is effective against common, classified threats.
  • The positive model, supported by AI, relies on learning normal application behavior and blocking any deviations. It is crucial for protecting against zero-day attacks and unusual anomalies.

The combination of the two models provides the broadest possible threat coverage. The negative model quickly eliminates known bads, while the positive model captures new and non-standard attacks. Intelligent algorithms help balance both approaches, minimizing false alarms. While CNP itself is not a WAF, it operates in an ecosystem where this hybrid approach is applied at the application protection level.

How does Cloud Native Protector use artificial intelligence and machine learning?

Artificial intelligence (AI) and machine learning (ML) are integral to the operation of Radware Cloud Native Protector, enabling automation and intelligent analysis at cloud scale. AI/ML is primarily used for behavioral analysis and anomaly detection. Algorithms learn what normal network activity, data access patterns, typical API call sequences and user behavior look like in a given cloud environment. They can then identify subtle deviations from that norm that may indicate an attack, even if they don’t match any known signature.

AI is also used to intelligently correlate events from various sources (network logs, APIs, configurations, permissions) to build a complete picture of a potential incident and prioritize alerts based on real risk. In the area of privilege management (CIEM), ML helps identify unused or excessive privileges by analyzing usage patterns. AI algorithms can also support automatic remediation by suggesting or executing the most appropriate corrective actions for detected issues. With AI/ML, Cloud Native Protector is able to process massive amounts of cloud data and draw useful security conclusions from it in an automated manner.

How does Radware protect against DDoS attacks in a cloud environment?

Radware is a recognized leader in protection against DDoS attacks, and Cloud Native Protector, while not a dedicated anti-DDoS solution per se, plays a role in Radware’s broader protection strategy for cloud environments. CNP, through network traffic monitoring (e.g., VPC Flow Logs) and behavioral analysis, can detect anomalies that indicate the launch of a DDoS attack, especially those targeting the application layer (L7).

This information can then be used to automatically trigger Radware’s dedicated DDoS mitigation mechanisms. In a hybrid scenario, CNP can work with the local DefensePro appliance to optimize its performance. More importantly, CNP can integrate with Radware’s Cloud DDoS Protection Service. When an attack exceeding certain thresholds is detected, CNP can initiate traffic redirection to Radware’s global scrubbing network, which has enormous capacity to absorb and neutralize even the largest volumetric attacks. In this way, CNP acts as an early warning and orchestration component of comprehensive DDoS protection for the cloud.

What are the security process automation capabilities of Radware Cloud Native Protector?

Automation is a key component of Radware Cloud Native Protector’s philosophy to increase efficiency and reduce the risk of human error. The platform offers extensive automation capabilities in various areas:

  • Automatic resource discovery: Continuous and automatic scanning of the cloud environment to maintain an up-to-date inventory of resources.

  • Automatic configuration and compliance scanning: Continuously compare configurations against security rules and compliance templates.

  • Automatic risk prioritization: AI algorithms automatically assess the severity of detected problems.

  • Automatic remediation (CloudBots): Ability to self-remediate detected configuration errors and inconsistencies using predefined scripts.

  • Automatic threat detection: Using AI/ML to identify anomalies and potential attacks without manual log analysis.

  • Automated alerts and integrations: Ability to automatically send alerts to relevant teams or integrate with SIEM/SOAR/ticketing systems.

These automation capabilities significantly ease the burden on security and IT teams, allowing them to focus on more complex and strategic tasks.

How does the Radware solution provide protection against zero-day attacks?

Protecting against zero-day attacks, that is, attacks that exploit previously unknown vulnerabilities or techniques, is one of the main challenges of modern cyber security. Radware Cloud Native Protector addresses this threat primarily through its advanced detection mechanisms based on behavioral analysis and artificial intelligence. Instead of relying solely on signatures of known threats, the system learns the normal behavior of the cloud environment - how resources communicate with each other, how users access data, what API calls are typical. It then looks for any anomalies or deviations from this norm. Unusual network activity, a suspicious sequence of API calls, an attempt to access resources in an unusual way - all of this can be flagged as a potential zero-day attack, even if it doesn’t fit any known pattern. In addition, integration with Radware’s global threat intelligence allows the company to quickly receive information about newly identified attack techniques and adjust detection mechanisms.

What is the process of deployment and integration of Cloud Native Protector into the existing infrastructure?

Thanks to its agentless architecture, the process of deploying Radware Cloud Native Protector is usually quick and relatively simple. Basic steps include:

  • Creating an account in the Radware service: Register and gain access to the CNP central management console.

  • Connecting cloud accounts: Configure secure access (read-only for most functions, with additional permissions for remediation) to AWS, Azure, GCP or other supported platforms accounts by creating appropriate IAM roles or service applications.

  • Automatic Discovery and Scanning: Once a connection is established, CNP automatically starts discovering resources and scanning their configuration and activity logs.

  • Performance review and prioritization: Analyze detected problems (misconfigurations, excessive permissions, non-compliance) and prioritize corrective actions.

  • Configure policies and automation: Customize built-in rules, compliance templates, and configure automatic remediation (CloudBots) and alerting rules.

  • Integration with other systems (optional): Connect CNP to existing SIEM, SOAR or ticketing systems.

The entire process is designed to be as minimally invasive as possible and to provide valuable information about the security status of the cloud environment as quickly as possible.

Summary: The real business benefits of Radware CNP.

  • Reducing the risk of breaches: Proactively addressing configuration vulnerabilities and excessive privileges significantly reduces the likelihood of a successful attack.

  • Simplified compliance: Automated monitoring and reporting facilitates compliance with regulatory requirements and reduces audit costs.

  • Increased operational efficiency: Automation of detection, response and remediation relieves the burden on security and IT teams.

  • Improved visibility and control: a central, consistent security view across complex multi-cloud environments.

  • Optimize cloud costs: Identify unused resources and potentially reduce costs associated with security incidents.

  • Support for innovation: More secure and faster deployment of cloud native applications with built-in protection mechanisms.

What are the real business benefits of deploying Radware Cloud Native Protector?

The implementation of Radware Cloud Native Protector translates into tangible, measurable business benefits. First and foremost is a significant reduction in the risk of costly data security breaches and associated financial losses, regulatory fines and reputational damage by proactively detecting and eliminating configuration gaps and excessive privileges. The platform simplifies and reduces the cost of maintaining compliance with key regulations and standards by automating the monitoring and reporting process.

The increased operational efficiency of security and IT teams resulting from the automation of routine detection, response and remediation tasks allows for better utilization of limited human resources. Improved visibility and control over a complex multi-cloud environment enables more informed architecture and security decisions. Identifying underutilized resources can lead to optimized cloud costs. Finally, by providing a solid security foundation, CNP supports faster and safer deployment of innovative cloud-native applications, which is critical for business growth in the digital age.

In summary, Radware Cloud Native Protector is a comprehensive and intelligent platform that provides the necessary tools to effectively manage security and compliance in dynamic public cloud environments. By combining advanced CSPM, CIEM and threat detection capabilities into a single, agentless and automated service, CNP allows organizations to regain control, reduce risk and fully leverage the potential of the cloud in a secure manner.

**Want to get the security of your cloud infrastructure under control? Contact the experts at nFlo. ** We will help you understand how Radware Cloud Native Protector can protect your assets and support you in its implementation process.

Learn key terms related to this article in our cybersecurity glossary:

  • CSPM (Cloud Security Posture Management) — CSPM (Cloud Security Posture Management) is a category of cloud security tools…
  • Antimalware — Antimalware is software designed to detect, prevent, and remove malicious…
  • Malware — Malware, short for ‘malicious software,’ is a general term encompassing various…
  • Network Security — Network security is a set of practices, technologies, and strategies aimed at…
  • Cybersecurity — Cybersecurity is a collection of techniques, processes, and practices used to…

Learn More

Explore related articles in our knowledge base:


Explore Our Services

Need cybersecurity support? Check out:

Share:

Want to Reduce IT Risk and Costs?

Book a free consultation - we respond within 24h

Response in 24h Free quote No obligations

Or download free guide:

Download NIS2 Checklist