New tools help enterprises organize and maximize their expanding multiple cloud infrastructure.
Findings highlight differences in security focus and ownership based on respondents’ roles, experience with containers, and maturity of deployment Tel Aviv, Israel and Copenhagen, Denmark: 18, October 2017: Aqua Security, the market-leading container security platform provider today announced the results of its first annual ‘Container Security in the Enterprise’ survey. With companies such as Facebook, …
Latest release of Aqua’s leading container security platform also features new capabilities that strengthen compliance and image assurance Tel Aviv, Israel and Copenhagen, Denmark – 17 October 2017 – Aqua Security, the market-leading container security platform provider, today announced version 2.6 of its solution, featuring general availability of runtime security for Windows Containers and a …
A few major announcements this month that we are happy to share with you: Aqua recently raised $25M in Series B funding to capitalize on the strong demand for our cloud-native container security platform. In addition, the Aqua’s Image security Scanner is now available on the Azure Marketplace. Lastly, we partnered with Red Hat and are now fully Interoperable with Red Hat OpenShift Container Platform. From the ecosystem, we hear that Kubernetes is gaining momentum with their recent 1.8 major release and by joining the Cloud Native Computing Foundry. Read all about these stories and more in our October edition.
The companies aim to help federal customers meet compliance requirements through the container security offering.
Aqua’s “Secure Once, Deploy Anywhere” Approach Streamlines Compliance and Reduces Complexity; Aqua and Carahsoft Already Enabled One Federal Agency to Build More Secure Applications Faster San Francisco, CA and Reston, VA; October 12, 2017: Aqua Security, the leading provider of container security solutions, and Carahsoft Technology Corp., the Trusted Government IT Solutions Provider™, today announced …
Security researchers discovered how threat actors can use the Docker REST API for remote code execution attacks. Michael Cobb explains this threat to Docker containers.
Despite their name, containers are by no means impervious to threats. With their use expected to grow, the time is ripe for determining the best security for containers.