The 2019 Container Adoption Survey reveals some trends about containers and what organizations use them for, and want from the technology.
Liz Rice, Technology Evangelist, Aqua Security and Jeff Brewer, VP & Chief Architect, Small Business & Self-Employed Group, Intuit, sits down with Stu Miniman and Corey Quinn at KubeCon + CloudNativeCon EU 2019 in Barcelona, Spain
We are thrilled to extend Aqua’s full-lifecycle security controls to VMware Enterprise PKS. We’ve seen a great deal of enthusiasm by our customers to adopt VMware’s fully supported Kubernetes distribution, and we are excited to be one of the very first to have certified our cloud native security platform as Partner Ready for VMware Enterprise […]
Organizations using VMware Enterprise PKS can now leverage Aqua’s granular security and compliance controls to protect their cloud-native workloads BOSTON – May 21, 2019 — Aqua Security, the leading platform provider for securing container-based and cloud native applications, today announced that Aqua Cloud Native Security Platform (CSP) has attained VMware Partner Ready status for PKS. […]
Portworx Partners with Aqua Security for 2019 Report, Reveals Increasing Financial Investment in Containers as Enterprises Motivated by Increased Developer Speed and Efficiency LOS ALTOS, Calif., May 21, 2019 — Portworx, the cloud-native storage and data management company modern enterprises trust to manage data in containers, and Aqua Security, a market leader in protecting container-based […]
“The most common and risky mistake is not using authentication for access to the API server since that is the main administration entry point to your cluster,” Jerbi says. “This also applies to anything that connects to the API server, like the K8s console UI.”
The Aqua Cloud Native Security Platform secures individual containers from the time they are first developed all the way though when they land in a production environment. It uses an inherent advantage of containers, the fact that they are always highly specialized for their jobs, to create a cybersecurity structure based on whitelisting.