2020 is going to see a significant move towards cloud and cloud native technologies. The challenge for most organisations is deciding which of those technologies will have the biggest impact on their business. In this short blog, Rani Osnat, VP of Strategy at Aqua Security, picks his four top areas where technology will have an …
Container security startup Aqua Security Software Ltd. says its open-source tool for scanning container images is now integrated by default with registries from Docker Inc. and the Mirantis Docker Enterprise platform, as well as Harbor, an open-source image registry project run by the Cloud Native Computing Foundation. Aqua sells a Cloud Native Security Platform for software containers, which are used to host …
Aqua Security today revealed that its open source Trivy container scanning software is now available by default in a growing number of container platforms. Currently available under a royalty-free Apache 2 license, Trivy will be included as the default scanner in Harbor, an open source container image registry project under the Cloud Native Computing Foundation …
Aqua Security released an open source tool this week for scanning image registries running on Docker and the enterprise version of Mirantis Docker. The security tool also targets Harbor, an open source container image registry project spearheaded by the Cloud Native Computing Foundation (CNCF). The Boston-based infrastructure security specialist said Monday (March 16) its Trivy …
BOSTON – March 16, 2020 – Aqua Security, the leading platform provider for securing cloud native applications and infrastructure, announced today that its open source Trivy vulnerability scanner is being added as an integrated option in widely used cloud native platforms, the CNCF’s Harbor registry and Mirantis Docker Enterprise. Trivy is a comprehensive and easy-to-use …
Dror Davidoff, CEO of Aqua says, “security issues arise in how enterprises configure and use public cloud services, especially IaaS (infrastructure as a service) and PaaS (platform as a service). Traditional application security constructs don’t work well, or at all, when using containers or serverless technologies to build cloud-native applications. It’s time to replace three long-held (and outdated) …
Container networking breaks many of the assumptions that make traditional firewalls and networking security controls work, says Rani Osnat, vice president of strategy at Aqua Security, a container security technology firm. Enterprises need a way to control ingress and egress; to micro-segment containers so that applications don’t interfere with each other; and to have firewalls that …
If you’re going to migrate a monolith to containers and run it with Kubernetes, do your due diligence on refactoring the application to maximize the benefits of such a move. “Containers can be used for ‘lifting and shifting’ existing applications, but in order to enjoy their benefits, you should consider refactoring them,” says Rani Osnat, …