{"id":23623,"date":"2026-04-30T21:25:08","date_gmt":"2026-04-30T21:25:08","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/23623\/"},"modified":"2026-04-30T21:25:08","modified_gmt":"2026-04-30T21:25:08","slug":"anthropic-launches-claude-security-5-things-to-know","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/23623\/","title":{"rendered":"Anthropic Launches Claude Security: 5 Things To Know"},"content":{"rendered":"<p>The public beta of Claude Security for Claude Enterprise customers is aimed at enabling discovery of code vulnerabilities and generation of fixes.<\/p>\n<p>            <img decoding=\"async\" loading=\"lazy\" alt=\"\" src=\".\/media_1b2ed9eb68a877fbf8aa4fb510acccbf616d198c4.png?width=750&amp;format=png&amp;optimize=medium\" width=\"690\" height=\"458\"\/><\/p>\n<p>Anthropic announced Thursday it\u2019s moving Claude Security, formerly known as Claude Code Security, into public beta to enable rapid AI-powered vulnerability discovery and remediation.<\/p>\n<p>The launch follows the widely discussed <a href=\"https:\/\/www.crn.com\/news\/security\/2026\/5-things-to-know-on-anthropic-s-claude-mythos-and-project-glasswing\" rel=\"nofollow noopener\" target=\"_blank\">disclosure<\/a> about Anthropic\u2019s Claude Mythos Preview earlier this month, though the Claude Security offering does not leverage Mythos.<\/p>\n<p>[Related: <a href=\"https:\/\/www.crn.com\/news\/security\/2026\/how-cisos-need-to-prepare-for-the-claude-mythos-era-of-cyberattacks-experts\" rel=\"nofollow noopener\" target=\"_blank\">How CISOs Need To Prepare For The Claude Mythos Era Of Cyberattacks: Experts<\/a>]<\/p>\n<p>\u201cToday\u2019s models are already highly effective at finding flaws in software code,\u201d Anthropic said in a blog <a href=\"https:\/\/claude.com\/blog\/claude-security-public-beta\" rel=\"nofollow noopener\" target=\"_blank\">post<\/a> Thursday. \u201cThe next generation will be more capable still, and will be particularly effective at autonomously exploiting these flaws.\u201d<\/p>\n<p>What follows are five things to know about Anthropic\u2019s launch of Claude Security.<\/p>\n<p>Availability For Enterprise Customers<\/p>\n<p>Anthropic said that it is opening up availability of its Claude Security offering more broadly with its move from limited research preview\u2014which saw the tool tested by \u201chundreds of organizations of all sizes\u201d\u2014into public beta.<\/p>\n<p>The public beta is available for all Claude Enterprise customers, the company said.<\/p>\n<p>Claude Team and Max customers are not yet able to access the offering, though Anthropic said that access for customers on those tiers is \u201ccoming soon.\u201d<\/p>\n<p>The offering, under the previous name of Claude Code Security, was originally announced in late February.<\/p>\n<p>Claude Mythos Not Included<\/p>\n<p>Following Anthropic\u2019s announcement about its unreleased Claude Mythos Preview earlier this month, the security industry has signaled that a massive push is needed around vulnerability management and hardening environments against a potentially massive spike in cyberattacks from the use of similar capabilities.<\/p>\n<p>Anthropic disclosed on April 7 that Claude Mythos Preview points to the fact that \u201cAI models have reached a level of coding capability where they can surpass all but the most skilled humans at finding and exploiting software vulnerabilities.\u201d<\/p>\n<p>However, Claude Mythos Preview will remain only available to participants in the company\u2019s Project Glasswing initiative, with the model not being utilized for Claude Security, Anthropic said.<\/p>\n<p>Opus 4.7 Is The Basis<\/p>\n<p>Instead of Claude Mythos Preview, Anthropic said that its recently debuted Opus 4.7 model will form the basis of the Claude Security offering.<\/p>\n<p>\u201cOur cybersecurity efforts go beyond Glasswing,\u201d Anthropic said in a post Thursday. \u201cWith Claude Security, a much wider set of organizations can put our most powerful generally-available model, Claude Opus 4.7, to work across their codebases.\u201d<\/p>\n<p>Ultimately, \u201cOpus 4.7 is among the strongest models available for finding and patching software vulnerabilities, and for discovering complex, context-dependent issues that might otherwise be missed,\u201d the company said.<\/p>\n<p>The offering \u201ccomes with scheduled and targeted scans, easier integration with audit systems, and improved tracking of triaged findings,\u201d Anthropic said.<\/p>\n<p>Focus On Remediation<\/p>\n<p>In addition to discovery vulnerabilities in code, Claude Security will also bring a focus on generating proposed fixes for those issues, Anthropic said.<\/p>\n<p>From its testing of Claude Security so far, Anthropic has learned that \u201ctime from scan to fix is the metric that matters.\u201d<\/p>\n<p>\u201cEarly users pointed to this consistently, with several teams going from scan to applied patch in a single sitting, instead of days of back-and-forth between security and engineering teams,\u201d the company said.<\/p>\n<p>Accenture, Infosys Among Users So Far<\/p>\n<p>On the list of organizations that have used Claude Security so far is consulting giant Accenture, No. 1 on CRN\u2019s Solution Provider 500 for 2025, as well as Infosys, No. 8 on CRN\u2019s Solution Provider 500.<\/p>\n<p>Other organizations that have used the offering, which were listed by Anthropic, include Deloitte and PwC. The companies are \u201cworking alongside enterprise security organizations to deploy Claude-integrated security solutions for vulnerability management, secure code review, and incident response programs,\u201d Anthropic said in its post.<\/p>\n<p>In terms of vendors, Anthropic pointed to partnerships with CrowdStrike, Microsoft, Palo Alto Networks, SentinelOne, TrendAI and Google Cloud-owned Wiz, which are \u201cintegrating Opus 4.7\u2019s capabilities into the security platforms that enterprises already run on today,\u201d the company said.<\/p>\n","protected":false},"excerpt":{"rendered":"The public beta of Claude Security for Claude Enterprise customers is aimed at enabling discovery of code vulnerabilities&hellip;\n","protected":false},"author":2,"featured_media":23624,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[24,405,408,53,3154,399,25,182,8916,313,223,415,318],"class_list":{"0":"post-23623","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-anthropic","8":"tag-ai","9":"tag-ai-agents","10":"tag-ai-applications","11":"tag-anthropic","12":"tag-anthropic-claude","13":"tag-application-and-platform-security","14":"tag-artificial-intelligence","15":"tag-claude","16":"tag-cloud-security","17":"tag-cybersecurity","18":"tag-generative-ai","19":"tag-llm","20":"tag-vulnerabilities"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/23623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=23623"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/23623\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/23624"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=23623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=23623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=23623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}