New release of Aqua’s cloud native security platform addresses the needs of large enterprise deployments with runtime visibility and multi-application, multi-team policy management BOSTON – November 13, 2018 – Aqua Security, the leading platform provider for securing container-based and cloud native applications, today announced version 3.5 of its cloud native security platform, which now protects …
Aqua Container Security Platform Recognized in the 2018 Container Technology Category BOSTON – November 12, 2018 – Aqua Security, the leading platform provider for securing container-based and cloud native applications, today announced that CRN®, a brand of The Channel Company, has recognized Aqua as a 2018 CRN Tech Innovator Awards finalist. These annual awards honor …
Tsvi Korren, chief solutions architect at Aqua Security, also agrees that the security standards need to be the same, regardless of whether an organization wrote its own code or is using some open-source component. “It doesn’t really matter if you write your own code or you get pre-compiled components or code snippets or just libraries, …
“Multi-cloud and hybrid cloud are gaining momentum on the enterprise CIO agenda, not just to avoid cloud provider lock-in, but as a strategy to push their organizations into a permanent mindset of cloud-native agility and flexibility,” says Amir Jerbi, CTO at Aqua Security. “Containers, being portable by nature, are a pivotal component in making that transition …
It’s widely recognized that Kubernetes has become the de facto standard for container orchestration. Just look at all the technology companies that are supporting Kubernetes in one way or another. It’s pretty clear the decision has been made to embrace Kubernetes. Aqua Security has thrown its hat into the ring with Kubernetes, through a series …
The security problems are the same as they always have been: vulnerable software being deployed—the traditional Meltdowns and Heartbleeds and ShellShocks—those kinds of vulnerabilities in software that get published and attackers find out about them. If you don’t have the tooling in place to secure all those instances, and attackers continue to look for the …
Containers can amplify kernel threats by sharing the same kernel and host. Poor container maintenance can expose IT environments to a higher risk of penetration. And unverified container images can be an invitation to malicious actors. Many risks can be reduced, however, if security considerations are baked into the container development process and the responsibility …
Amir Jerbi, CTO at Aqua Security, suggests explaining cloud-native as an app for booking airline flights. “As a cloud-native app, our flight booking app can run equally well on [public clouds] or private infrastructure. We can also update very specific features, fix small bugs, [and other needs] only by swapping out specific microservices components, with no …