Cloud Security

NeuVector Included as Launch Company for New AWS Marketplace for Containers

Las Vegas, NV – November 27, 2018 – NeuVector, a leader in Kubernetes container network security delivering the first and only multi-vector container firewall, today announced its inclusion as an Amazon Web Services (AWS) Partner Network (APN) Launch Partner for the brand new AWS Marketplace for Containers. NeuVector is making the announcement at AWS re:Invent… Read more »

Container Security

Shift Left, Then Right for Runtime Application Container Security

In this new Solution Showcase by Enterprise Strategy Group (ESG), Senior Analyst Doug Cahill reviews recent research on application container adoption trends, then outlines how to build security into the DevOps and SecOps use cases. Abstract: The broad adoption of application containers for both new applications and those being refactored into a microservices architecture has… Read more »

Container Security

OpenShift Security Automation

Containers and tools like Red Hat OpenShift enable enterprises to automate many aspects of application deployment, with many significant business benefits. But it’s easy to forget to automate the security aspects of containers. There are many built-in features for OpenShift security automation in the platform, but don’t stop there. Automating run-time security for OpenShift deployments… Read more »

Open Source Security

Cloud Security

Achieving Open Source Security in Container Environments

By Tim Mackey, Technology Evangelist , Black Duck by Synopsys This is a guest post from NeuVector partner Black Duck Software. Today, open source components are at the heart of most modern applications, transforming how we architect solutions in every industry. Black Duck’s 2017 Open Source Security and Risk Analysis of over 1000 commercial applications revealed that… Read more »

Container Security

How to Enforce DNS-based Egress Container Security Policies in Kubernetes and Openshift

By Gary Duan While more and more applications are moving to a microservices and container-based architecture, there are legacy applications that cannot be containerized. Access to these applications need to be secured with egress container security policies when containers are deployed with Kubernetes or Red Hat OpenShift. These legacy applications include database servers and applications… Read more »