Best Cloud Workload Protection Solutions: A Runtime-First Evaluation Guide
Key Insights What is a cloud workload protection platform (CWPP)? Security for the workloads actually...
Jan 20, 2026
It’s been a big month at ARMO – we shipped several powerful new capabilities to help you get more visibility, move faster, and stay ahead of real threats. Here’s what’s new.
Get full visibility into the security posture of your Azure subscriptions – from VMs to identities and policies. ARMO now continuously analyzes your Azure environment for misconfigurations, risky permissions, and compliance gaps.
Why it matters: You can now detect and prioritize Azure risks before they become breaches, using the same unified risk model you already trust for Kubernetes and AWS.
Docs: Connect Azure to ARMO

ARMO now supports full posture management for GCP projects, including compute, storage, networking, and IAM. We ingest and analyze your GCP resource configurations and security controls to surface exposures and compliance issues.
Why it matters: You get a consistent, multi-cloud security posture view across AWS, Azure, and GCP — without switching tools or workflows.
Docs: Connect GCP to ARMO

You can now stream ARMO runtime incidents and detections directly into your SIEM provider. This includes incident metadata, workload context, threat classification, and response actions.
Why it matters: Your SOC teams can investigate Kubernetes and cloud runtime threats inside their existing SIEM workflows – with rich context instead of raw alerts.
Docs: SIEM integrations

ARMO now integrates with Linear, allowing you to automatically create and track security issues in your dev team’s ticketing system. Incidents and findings can be pushed directly to Linear with full context.
Why it matters: Security findings now land where developers already work, making it easier to fix issues fast and keep everyone aligned.
Docs: Connect Linear to ARMO

ARMO now integrates with GitLab Container Registry to scan container images before they are deployed to Kubernetes workloads. We analyze images for known vulnerabilities, risky packages.
Why it matters: Scanning container images in the registry catches vulnerabilities before they ever reach a cluster, turning security from a firefight into a quality gate. Teams can block risky images, fix issues earlier in the pipeline, and avoid deploying known-exploitable software into production.
Docs: GitLab registry integration

You can now create your own custom runtime detection rules using CEL (Common Expression Language). Define exactly what suspicious or risky behavior looks like, based on workload, process, network, file, or cloud activity.
Why it matters: This gives you full control to detect what matters most to your environment, without relying only on generic rules or noisy signatures.
Docs: Custom Detection Rules

Key Insights What is a cloud workload protection platform (CWPP)? Security for the workloads actually...
The ARMO-Rapid7 partnership connects broad attack surface coverage with deep cloud and Kubernetes runtime security...
Hi there,We’ve just dropped a fresh batch of updates to help you cut through the...