NeuVector Announces New Run-time Container Security Capabilities for AWS Cloud with Integrations for AWS EKS, AWS ECS and AWS App Mesh
GLEN KOSAKA Articles AWS Cloud Security ECS EKS Leave a Comment
Offers comprehensive run-time container security for customers deploying on AWS
Boston, at AWS re:Inforce, June 25, 2019 – NeuVector, the leader in container network security, today announced comprehensive run-time container security for enterprises deploying in the Amazon Web Services (AWS) Cloud. AWS Cloud integrations now available from NeuVector include:
- AWS Elastic Container Service for Kubernetes (AWS EKS) with automated deployment on EKS with Kubernetes ConfigMaps
- AWS ECS with complete run-time security for containers
- AWS App Mesh with a layer 7 container firewall capable of inspecting and protecting service mesh traffic (even if encrypted by AWS App Mesh)
These comprehensive integrations with AWS cloud services enable enterprises requiring in-depth defense to easily and automatically protect containers during their entire lifecycle, from build to ship to run.
NeuVector today also announced several new features that have been recently integrated into NeuVector’s end-to-end container security platform, including:
- Kubernetes ConfigMaps: provides completely automated, predefined NeuVector configuration to ensure secure and error-free deployment.
- Process and file system blocking: stops potentially malicious processes, file system activity, and network connections.
- Process history recording: makes it easy to review the process history in order to discover anomalies and to fully capture forensic history.
- Multi-layer image scanning: scans image layers for a deeper and more accurate analysis of potential vulnerabilities.
- New dashboard wizard: improves security posture by recommending improvements, corrective actions, and security checklists for review.
All of these new capabilities are available for both public cloud container deployments, such as on AWS Cloud, as well as on-premise container deployments.
The NeuVector platform now supports automated container security deployments by providing “Policy as Code” automation for ultra-secure container deployments. It accomplishes this by leveraging featured Kubernetes ConfigMaps to achieve secure initial deployments into production environments with predefined configurations. In addition, a declarative security policy tool enables developers and DevOps teams to predefine run-time security rules for deployment from the beginning of the application lifecycle, whenever a new service is deployed. This includes network and process whitelisting in standard Kubernetes YAML files that can be deployed concurrently with new applications to ensure their security in production. At the same time, NeuVector’s new controls for process and file system blocking enhance run-time security without compromising network protection. Process history recording also adds to existing network packet captures to offer complete forensic recording of cluster activities.
“Securing our customers’ information is a critical piece of our mission at Chime. We are committed to delivering the highest levels of security and privacy across all of our systems,” said Nathan Oakes, Sr. Manager of Technical Operations, Chime. “We selected NeuVector because of its proven expertise in container network security, and specifically for its comprehensive approach to run-time protection. With its industry leading container firewall, NeuVector enables us to protect our container traffic from malicious attacks, vulnerabilities and hackers.”
“At NeuVector, we thoroughly understand the automation and visibility required to achieve fully-secured container environments at run-time, and actively pursue new features designed to offer the most meaningful security enhancements available from an enterprise perspective,” said Fei Huang, co-founder and CEO, NeuVector. “We’re excited to introduce these new capabilities at the inaugural AWS re:Inforce, and to demonstrate how NeuVector’s integrations with the AWS Cloud help to keep enterprises and their customers secure.”
About NeuVector
NeuVector, the leader in Container Network Security, protects Kubernetes in production. NeuVector delivers complete run-time security without compromise and is the only next generation container firewall with packet-level interrogation and enforcement. NeuVector customers include global leaders in financial services, healthcare, transportation, publishing and other industries. NeuVector partners with Alibaba, AWS, Docker, Google Cloud, IBM, Microsoft Azure, Rancher, Red Hat, and others. Founded by industry veterans from Fortinet, VMware, and Trend Micro, NeuVector has developed patent-pending behavioral learning for container security.
Categories
- Container Security (75)
- Cloud Security (35)
- Docker Security (30)
- Kubernetes Security (26)
- Press Releases (21)
- Container Threats (18)
- Network Security (18)
- Articles (14)
- Kubernetes (13)
- Vulnerabilities (13)
- Container Networking (8)
- Container Firewall (7)
- Exploits (7)
- RedHat OpenShift (7)
- cloud-native security (7)
- AWS (6)
- Partnerships (6)
- Alerts (4)
- Ebooks + Guides (4)
- data loss prevention (4)
- security automation (4)
- service mesh (4)
- Cloud services (3)
- Compliance (3)
- Cyber Attacks (3)
- Kubernetes system (3)
- Microservices (3)
- NeuVector Product (3)
- Serverless (3)
- dlp (3)
- AWS ECS (2)
- CI/CD (2)
- CIS Benchmark (2)
- Customer Stories (2)
- Docker (2)
- Infrastructure as Code (2)
- Istio (2)
- Open Source (2)
- PCI Compliance (2)
- PCI-DSS (2)
- Slider Ebooks & Guides (2)
- Terraform (2)
- VMware (2)
- run-time (2)
- security mesh (2)
- shift left (2)
- waf (2)
- Alibaba (1)
- App Mesh (1)
- Backdoor (1)
- Banking (1)
- Black Duck Software (1)
- Docker Hub (1)
- Docker Networking (1)
- Docker container firewall (1)
- ECS (1)
- EKS (1)
- Events (1)
- Financial Services (1)
- GDPR (1)
- IBM Cloud (1)
- Internet of Things (1)
- JFrog (1)
- Jenkins (1)
- Knative (1)
- OpenShift (1)
- Secrets (1)
- VMware Photon (1)
- Virtual Patching (1)
- Webinar (1)
- admission control (1)
- application security (1)
- container risk score (1)
- cpu optimization (1)
- crypto (1)
- data breach (1)
- dpi (1)
- grafana (1)
- linkerd2 (1)
- micro-perimeter (1)
- monitoring (1)
- pci (1)
- prometheus (1)
- rancher (1)
- real-time containers (1)
- sdlc (1)
- sensitive data (1)