This is our last edition for 2017, highlighting a year full of container related activities and announcements! While still considered as a relatively new technology, the container market is booming and blooming and its adoption rate is no longer in question. Just last week VMware announced it now supports microservices, and AWS announced Fargate: a new container service. On the Aqua side, we can share that Aqua now offers a Pay-Per-Scan service for AWS; and that a new Container Technology wiki is now live and will serve the entire container community.
The New Vendor-Neutral Wiki Will Serve as a Community Resource for Container Technology, Architecture, Security and Orchestration Burlington, MA, December 5, 2017 – Aqua Security today announced the launch of the industry’s first Container Wiki: the largest organized compilation of publicly available content about container technology to date. The site will cover more than 200 …
Using containers and microservices to provide better IAM.
Extends Aqua’s Pay-Per-Scan Service on Amazon Virtual Private Clouds Burlington, MA – November 29, 2017 – Aqua Security today announced that its security scanning service for container images on Amazon Web Services (AWS) now supports AWS PrivateLink, a new managed service designed to enable customers and partners to connect their virtual private clouds (VPCs) in …
Aqua Security Offers Pay Per Scan Service for AWS
Avec sa plate-forme Aqua Container Security, la start-up israélienne Aqua Security s’attaque au problème de la sécurité des applications conteneurisées, aussi bien durant la phase de développement que durant la phase d’exécution.
Pay-Per-Scan Offering Allows Customers to Ensure Images are Free of Common Security Issues such as Known Vulnerabilities, Sensitive Data and Configuration Errors Nov 15, 2017, Tel Aviv, Israel – Aqua Security today announced that it’s launched a pay per scan, on-demand vulnerability scanning service for Amazon Web Services (AWS) customers that build, store, or manage container images …
In a multiplatform environment, with communication lines running between several different cloud services and on-premises systems, those connecting lines may be the most vulnerable part of your cloud architecture. Make sure they are checked and rechecked.