Avatar photo
By: Dawn van Hoegaerden

January 6, 2021 12:30 pm

1,498 views

Looking @ Aqua Security, Palo Alto Networks Prisma, or StackRox? Learn why global enterprises are switching to NeuVector for Kubernetes Security

As enterprises migrate to the cloud, shift left with DevOps strategies, and invest in microservices, security strategies need a fresh look. Early container security solutions focused on vulnerability scanning. While it is critical to identify flaws as early in the process as possible, that is the beginning and not the end of the process. Zero […]

Read More


Avatar photo
By: Glen Kosaka

August 21, 2020 12:44 pm

1,621 views

Protect Kubernetes Containers on AWS Using the Shared Responsibility Model

Editor's note: This post was updated on August 17, 2022 Deploying an AWS container security solution is a critical requirement to protect your data and assets running on AWS, including EC2, EKS, ECS, Kubernetes, or RedHat OpenShift. In its ‘Shared Responsibility Model,’ AWS states that the security responsibility is shared between AWS and […]

Read More


Avatar photo
By: Gary Duan

July 9, 2020 12:04 pm

889 views

Use Cloud-Native Tools OPA and CRD to Protect Applications from Pipeline to Production

Application owners and IT administrators have been looking for tools that can help them secure their application pipeline, from the development stage to deployment and production. How to do this reliably and efficiently without slowing down development processes remains a big challenge. This is where Open Policy Agent (OPA) and Kubernetes Custom Resource Definitions (CRD) […]

Read More


Avatar photo
By: Fei Huang

June 4, 2020 12:11 pm

1,014 views

How to Protect Secrets in Containers Using DPI and DLP

Every cloud application and service utilizes a key (secret) to identify and authorize communications. Secrets are also used to authorize access to containerized applications which require a login. These credentials are widely used by public facing services as well as internal and external REST API’s everywhere. Examples include the AWS IAM access key, Google […]

Read More


Avatar photo
By: Glen Kosaka

March 26, 2020 12:23 pm

1,282 views

End-to-End Vulnerability Management for Images, Containers and Kubernetes

NeuVector 3.2 Release Adds a Vulnerability & Compliance ‘Explorer,’ High Performance Scanner, and Host Process Protection   The ‘Shift-Left’ movement to build security into the CI/CD pipeline continues to grow. Vulnerability management is a critical component of this, and organizations must ‘Shift-Left, then Shift-Right‘ in order to fully […]

Read More


Avatar photo
By: Glen Kosaka

November 6, 2019 12:30 pm

1,906 views

How to Create ‘Security Policy as Code’ to Automate Application Security Policies in the CI/CD Pipeline

DevOps and DevSecOps teams can now automatically deploy and update new applications securely using Kubernetes Custom Resource Definition (CRDs)   As DevOps teams integrate their toolchain to enable automated deployment of container-based applications, one aspect has always slowed down a modern cloud-native pipeline: security. And while automated vulnerability scanning is now standard practice, creating […]

Read More


Avatar photo
By: Glen Kosaka

August 1, 2019 12:38 pm

1,361 views

Container Security Monitoring with Prometheus and Grafana

Today, millions of applications are running in containers, with many millions more going into production.  It is not easy to manage and monitor a massive number of containers in any deployment at the same time. In order to better visualize and track container status, the combination of Prometheus and Grafana provides a simple, easy-to-deploy […]

Read More


Avatar photo
By: Neuvector

December 7, 2016 3:06 pm

785 views

How to Secure AWS Containers and Use ECS for Container Security

AWS containers are growing rapidly in popularity but how to secure containers in production is still a new topic. In this video from AWS re:Invent Henrik Johansson and Michael Capicotto present how to secure containers on AWS and use AWS ECS for security and governance. We also provide a summary below. Session Description Containers have […]

Read More