Container Security

figo Converts to Container Infrastructure for Speed, Efficiency and Scalability

Building in Reliability to Meet Regulatory Demands The German banking service provider figo is on a mission to reduce complexity and increase reliability and scalability across its infrastructure. To reach these goals, while also addressing the ongoing demands of banking and privacy regulations, figo is converting to a Kubernetes container-based infrastructure. As figo says, “these… Read more »

Network Security

How Kubernetes Networking Works – Under the Hood

How to Understand and Set Up Kubernetes Networking, Including Multiple Networks   By Tobias Gurtzick Kubernetes networking is a complex topic, if not even the most complicated topic. This post will give you insight on how kubernetes actually creates networks and also how to setup a network for a kubernetes cluster yourself. This article doesn’t… Read more »

kubernetes networking

Network Security

How Kubernetes Networking Works – The Basics

By Gary Duan Kubernetes 101 Before I get into Kubernetes networking, here are the basic concepts to know about in Kubernetes. For those not familiar with Kubernetes, these are the objects and terms used in a Kubernetes deployment. Kubernetes is a container orchestration and management tool for automating the deployment and monitoring of containers. Kubernetes… Read more »

Container Security

Enhancing OpenShift and Kubernetes Container Security for Business Critical Deployments

In this webinar from DevOps.com, Andrew Toth from Red Hat outlines typical threats and security measures to protect container deployments and will share information on built-in security features of OpenShift and Kubernetes. Glen Kosaka from NeuVector then presents how to enhance security for Kubernetes and OpenShift by using advanced Kubernetes container security features to improve visibility… Read more »

Container Security

How to Enforce DNS-based Egress Container Security Policies in Kubernetes and Openshift

By Gary Duan While more and more applications are moving to a microservices and container-based architecture, there are legacy applications that cannot be containerized. Access to these applications need to be secured with egress container security policies when containers are deployed with Kubernetes or Red Hat OpenShift. These legacy applications include database servers and applications… Read more »