Establishes Aqua as having specialized technical proficiency and proven customer success in securing container workloads on AWS BOSTON – 27 Nov. 2018 – Aqua Security, a leading platform provider for securing container-based and cloud native applications and an advanced Amazon Web Services (AWS) Partner Network (APN) Partner, announced today that it has achieved AWS Container […]
Episode 123 – Josh and Kurt talk to Liz Rice about Kubernetes and container security. How did we get where we are today, what’s new and exciting today, and where do we think things are going.
New release of Aqua’s cloud native security platform addresses the needs of large enterprise deployments with runtime visibility and multi-application, multi-team policy management BOSTON – November 13, 2018 – Aqua Security, the leading platform provider for securing container-based and cloud native applications, today announced version 3.5 of its cloud native security platform, which now protects […]
Aqua Container Security Platform Recognized in the 2018 Container Technology Category BOSTON – November 12, 2018 – Aqua Security, the leading platform provider for securing container-based and cloud native applications, today announced that CRN®, a brand of The Channel Company, has recognized Aqua as a 2018 CRN Tech Innovator Awards finalist. These annual awards honor […]
Tsvi Korren, chief solutions architect at Aqua Security, also agrees that the security standards need to be the same, regardless of whether an organization wrote its own code or is using some open-source component. “It doesn’t really matter if you write your own code or you get pre-compiled components or code snippets or just libraries, […]
“Multi-cloud and hybrid cloud are gaining momentum on the enterprise CIO agenda, not just to avoid cloud provider lock-in, but as a strategy to push their organizations into a permanent mindset of cloud-native agility and flexibility,” says Amir Jerbi, CTO at Aqua Security. “Containers, being portable by nature, are a pivotal component in making that transition […]
The security problems are the same as they always have been: vulnerable software being deployed—the traditional Meltdowns and Heartbleeds and ShellShocks—those kinds of vulnerabilities in software that get published and attackers find out about them. If you don’t have the tooling in place to secure all those instances, and attackers continue to look for the […]