Container Security

Shift Left, Then Right for Runtime Application Container Security

In this new Solution Showcase by Enterprise Strategy Group (ESG), Senior Analyst Doug Cahill reviews recent research on application container adoption trends, then outlines how to build security into the DevOps and SecOps use cases.

ESG Solution ShowcaseAbstract: The broad adoption of application containers for both new applications and those being refactored into a microservices architecture has created the need for purposeful container security solutions. And as application containers move along the build-ship-run continuum into production environments, such solutions need to protect containers from being compromised from multiple vectors. Integration into the orchestration platforms that automate container management lifecycle is an immutable aspect of application container security that represents an opportunity to assure that containers are secured from registry to production. NeuVector provides an application container security solution focused on protecting the runtime integrity of containers from multiple attack vectors by automating the introduction of security controls via integration with container orchestration platforms.

Download the Research

 

Doug Cahill presents additional research results for application container adoption trends in this webinar titled “Shift Left then Right for DevOps & SecOps.”

About the Author

Glen is VP Marketing & Product Management at NeuVector.
Glen has over 20 years of experience in enterprise security, marketing SaaS, and infrastructure software. He has held executive management positions at Trend Micro, Provilla, Reactivity, Quantum and Rignite.

NeuVector is the leader in Kubernetes security and delivers the first and only multi-vector container security platform. NeuVector enables the confident deployment of enterprise-wide container strategies, across multi-cloud and on-premise environments. NeuVector delivers east-west container traffic visibility, host security and container inspection in a highly integrated, automated security solution.