Arvato Infoscore Moves to Microservices Securely with NeuVector
GLEN KOSAKA Container Security Cloud Security Microservices Container Threats Customer Stories Leave a Comment
Container Visibility and Microservices Security Was Critical for Migration Project
The Container Project
A year ago, Arvato, a subsidiary of Bertelsmann, embarked on an ambitious plan to migrate to a microservices based architecture with Docker containers as a key enabler. The project required robust microservices security and would enable Arvato to be more effective in processing consumer and device data from customers to detect fraud. But strict data protection laws in Germany means this has to be done securely. In addition, TÜV compliance regulations require logical separation of applications.
Arvato has successfully deployed the first phase of the migration to production, but not without a few challenges. The project required development of a new big data app as well as migration of an existing application. There were initial difficulties debugging connections between services. Several technologies and platforms were tested before deployment to production.
Getting run-time visibility and security was a final hurdle.
The NeuVector Microservices Security Solution
NeuVector was selected to “inject intelligence” into the run-time environment for visibility and network security.
- Apply security best practices to containers and microservices
- Get network visibility to debug and protect containers
- Enable TÜV compliance through segmentation & scanning
“NeuVector provides the network inspection, visualization, and security needed for dynamic container environments. The solution integrates easily into our automated workflow and the built-in intelligence lets us scale quickly. It even helped us debug network connections from mis-configured application updates,” said Tobias Gurtzick, Security Architect, Arvato
The NeuVector microservices security solution provided image vulnerability scanning, network observation, and detection of traffic flows. This was critical for validating all internal and external connections. In the production environment, NeuVector provides automated application segmentation, high availability, and rolling updates, which will enable Arvato to continue to expand securely.
NeuVector’s container-based solution easily integrated into the continuous integration and continuous delivery (CI/CD) pipeline of Arvato. It seamlessly worked with new and legacy technologies including nodejs, ubuntu, Docker, Rancher, ELK (Elasticsearch, Logstash, Kibana), Graphana and legacy database services.
Categories
- Container Security (75)
- Cloud Security (35)
- Docker Security (30)
- Kubernetes Security (26)
- Press Releases (21)
- Container Threats (18)
- Network Security (18)
- Articles (14)
- Kubernetes (13)
- Vulnerabilities (13)
- Container Networking (8)
- Container Firewall (7)
- Exploits (7)
- RedHat OpenShift (7)
- cloud-native security (7)
- AWS (6)
- Partnerships (6)
- Alerts (4)
- Ebooks + Guides (4)
- data loss prevention (4)
- security automation (4)
- service mesh (4)
- Cloud services (3)
- Compliance (3)
- Cyber Attacks (3)
- Kubernetes system (3)
- Microservices (3)
- NeuVector Product (3)
- Serverless (3)
- dlp (3)
- AWS ECS (2)
- CI/CD (2)
- CIS Benchmark (2)
- Customer Stories (2)
- Docker (2)
- Infrastructure as Code (2)
- Istio (2)
- Open Source (2)
- PCI Compliance (2)
- PCI-DSS (2)
- Slider Ebooks & Guides (2)
- Terraform (2)
- VMware (2)
- run-time (2)
- security mesh (2)
- shift left (2)
- waf (2)
- Alibaba (1)
- App Mesh (1)
- Backdoor (1)
- Banking (1)
- Black Duck Software (1)
- Docker Hub (1)
- Docker Networking (1)
- Docker container firewall (1)
- ECS (1)
- EKS (1)
- Events (1)
- Financial Services (1)
- GDPR (1)
- IBM Cloud (1)
- Internet of Things (1)
- JFrog (1)
- Jenkins (1)
- Knative (1)
- OpenShift (1)
- Secrets (1)
- VMware Photon (1)
- Virtual Patching (1)
- Webinar (1)
- admission control (1)
- application security (1)
- container risk score (1)
- cpu optimization (1)
- crypto (1)
- data breach (1)
- dpi (1)
- grafana (1)
- linkerd2 (1)
- micro-perimeter (1)
- monitoring (1)
- pci (1)
- prometheus (1)
- rancher (1)
- real-time containers (1)
- sdlc (1)
- sensitive data (1)