figo Converts to Container Infrastructure for Speed, Efficiency and Scalability

Glen Kosaka Container Security

Building in Reliability to Meet Regulatory Demands The German banking service provider figo is on a mission to reduce complexity and increase reliability and scalability across its infrastructure. To reach these goals, while also addressing the ongoing demands of banking and privacy regulations, figo is converting to a Kubernetes container-based infrastructure. As figo says, “these measures ensure figo API’s future-readiness …

How Kubernetes Networking Works – Under the Hood

Glen Kosaka Network Security

How to Understand and Set Up Kubernetes Networking, Including Multiple Networks   By Tobias Gurtzick Kubernetes networking is a complex topic, if not even the most complicated topic. This post will give you insight on how kubernetes actually creates networks and also how to setup a network for a kubernetes cluster yourself. This article doesn’t cover how to setup a …

kubernetes networking

How Kubernetes Networking Works – The Basics

Glen Kosaka Network Security

By Gary Duan Kubernetes 101 Before I get into Kubernetes networking, here are the basic concepts to know about in Kubernetes. For those not familiar with Kubernetes, these are the objects and terms used in a Kubernetes deployment. Kubernetes is a container orchestration and management tool for automating the deployment and monitoring of containers. Kubernetes is supported by all major …

Enhancing OpenShift and Kubernetes Container Security for Business Critical Deployments

NeuVector Container Security

In this webinar from DevOps.com, Andrew Toth from Red Hat outlines typical threats and security measures to protect container deployments and will share information on built-in security features of OpenShift and Kubernetes. Glen Kosaka from NeuVector then presents how to enhance security for Kubernetes and OpenShift by using advanced Kubernetes container security features to improve visibility and protection in production. An …

How to Enforce DNS-based Egress Container Security Policies in Kubernetes and Openshift

Gary Duan Container Security

By Gary Duan While more and more applications are moving to a microservices and container-based architecture, there are legacy applications that cannot be containerized. Access to these applications need to be secured with egress container security policies when containers are deployed with Kubernetes or Red Hat OpenShift. These legacy applications include database servers and applications developed with .NET frameworks. The …