NeuVector has a new approach to securing Docker containers

Posted on Wednesday, February 1, 2017 by RICHARD HARRIS, Executive Editor

NeuVector has announced the launch and availability of a new approach to securing Docker containers. With constant behavioral learning automatically applied to security policies for containers, the platform secures containers where they have been most vulnerable: in production environments where they are constantly being deployed, updated, moved, and scaled across hosts and data centers. Companies with production Docker deployments (or who are evaluating container-based applications) can quickly test-drive their solution to stronger and faster container security.

Their solution for container security is itself a container. The application automatically learns and whitelists normal behavior to protect environments even as containers scale up and down. Through this built-in continuous application and network intelligence, NeuVector is providing application layer segmentation that completely isolates container traffic. Any abnormal connections can then be proactively and automatically detected and blocked before causing harm. It completes its solution with runtime vulnerability scanning across all running containers and hosts, and includes threat detection for attacks such as DDoS, DNS, and others.

“Coming from a traditional network security background, we quickly realized that existing approaches are not adaptable to container environments – they don’t transfer well, and other solutions are slow and incomplete,” said Fei Huang, CEO, NeuVector. “In order for security teams to keep up with DevOps, they can’t be running around inspecting iptables and updating rules. What we’ve designed is a security container that is intelligent enough to understand – in real-time – what applications are doing. There’s not a faster, easier, and more secure way to ensure Docker container environments are protected from unwanted or malicious traffic.”

Uniquely, their no-configuration security container can see all network traffic and instantly correlate with application behavior to determine threats and violations. Also, unlike other false-positive-prone container security offerings, the solution can block only suspicious container traffic without affecting good traffic to the container.

More App Developer News

Wave 100i and Wave 150i harmonic drive mounts from Sky-Watcher arrive



Deep space astrophoto targets for May of 2024



A new Hercules rotating focuser lands from Optec



Buildbox 4 AI turns game ideas into reality faster than ever



Odeeo hires Spotify executive James Cowan



Copyright © 2024 by Moonbeam Development

Address:
3003 East Chestnut Expy
STE# 575
Springfield, Mo 65802

Phone: 1-844-277-3386

Fax:417-429-2935

E-Mail: contact@appdevelopermagazine.com