The challenge of explaining serverless to people isn’t technical but literal: The term is a misnomer. “Serverless is a rather bad name for a cohort of technologies that enable executing application code without managing or caring about the underlying infrastructure, and doing so on demand and in a highly automated way,” says Amir Jerbi, CTO at Aqua Security.
Aqua recognized for taking an innovative approach to solving cloud native and container security challenges BOSTON – February 19, 2019 – Aqua Security, the leading platform provider for securing container-based and serverless cloud-native applications, today announced has been selected as a winning Security Trailblazer in the 2018 Tech Trailblazers Awards. The awards program focuses on […]
Aqua Co-founder and CTO Amir Jerbi honored as a visionary who recognized the need for a new approach to security in a cloud native world BOSTON – February 12, 2019 – Aqua Security, the leading platform provider for securing container-based and cloud native applications, today announced that Info Security Products Guide, the industry’s leading information […]
“There are always going to be vulnerabilities,” Rani Osnat, vice president of product marketing at Aqua Security, told SDxCentral during the KubeCon + CloudNativeCon North America 2018 event in Seattle. “The fact that one was found was to be expected. And I expect more will be found going forward. That’s just what should be expected […]
“Operators can simplify how you run Kubernetes applications, removing the complexity of managing the nuts and bolts of Kubernetes, and allowing you to do so in a repeatable manner,” says Amir Jerbi, CTO at Aqua Security.
Serverless and containerizations trends, post-Kubernetes open-source computing, Container Sandboxing, Datadog and Container Security, Tech comparisons resources and more.
Traditional security tools cannot handle the velocity, scale, and dynamic networking capabilities of containers. Taking this a step further, serverless functions prioritize simplicity and agility by abstracting infrastructure concerns to provide a simple execution environment for applications and microservices. Attackers may leverage a vulnerability in base images used for containers, outsourced libraries or in serverless […]