NeuVector Announces the Release of Enhanced Run-Time Protection for Suspicious Containers
GLEN KOSAKA Docker Security Container Firewall Leave a Comment
Today at DockerCon in Copenhagen NeuVector announced and demonstrated new container protection features. We also announced that NeuVector customer Arvato would be sharing their microservices migration journey in session #126523.
Enhanced Run-Time Protection for Suspicious Containers
With the release of NeuVector’s new quarantine capability and other new protections at DockerCon Europe 2017, security teams can now automatically or manually quarantine a container that has potentially been compromised. A container quarantine isolates the container from all incoming and outgoing connections, while also preserving it for forensic investigation. Security and devops teams can still use the Docker engine to inspect the container and monitor subsequent behavior. The NeuVector container firewall supports both Docker Community Edition and Enterprise Edition.
Arvato Migration Case Study
NeuVector also announced that Tobias Gurtzick, Software Engineer at Arvato Bertelsmann (a NeuVector customer), will be speaking at DockerCon this week in a session titled “How to Secure the Journey to Big Data Microservices.” Mr. Gurtzick will be available to speak to attendees at the NeuVector booth (#E3) by requesting an appointment at info@neuvector.com.
Categories
- Container Security (74)
- Cloud Security (35)
- Docker Security (30)
- Kubernetes Security (26)
- Press Releases (21)
- Network Security (18)
- Container Threats (17)
- Articles (14)
- Kubernetes (13)
- Vulnerabilities (13)
- Container Networking (8)
- Container Firewall (7)
- Exploits (7)
- RedHat OpenShift (7)
- cloud-native security (7)
- AWS (6)
- Partnerships (6)
- Alerts (4)
- Ebooks + Guides (4)
- data loss prevention (4)
- security automation (4)
- service mesh (4)
- Cloud services (3)
- Compliance (3)
- Cyber Attacks (3)
- Kubernetes system (3)
- Microservices (3)
- NeuVector Product (3)
- Serverless (3)
- dlp (3)
- AWS ECS (2)
- CI/CD (2)
- CIS Benchmark (2)
- Customer Stories (2)
- Docker (2)
- Infrastructure as Code (2)
- Istio (2)
- Open Source (2)
- PCI Compliance (2)
- PCI-DSS (2)
- Slider Ebooks & Guides (2)
- Terraform (2)
- VMware (2)
- run-time (2)
- security mesh (2)
- shift left (2)
- waf (2)
- Alibaba (1)
- App Mesh (1)
- Backdoor (1)
- Banking (1)
- Black Duck Software (1)
- Docker Hub (1)
- Docker Networking (1)
- Docker container firewall (1)
- ECS (1)
- EKS (1)
- Events (1)
- Financial Services (1)
- GDPR (1)
- IBM Cloud (1)
- Internet of Things (1)
- JFrog (1)
- Jenkins (1)
- Knative (1)
- OpenShift (1)
- Secrets (1)
- VMware Photon (1)
- Virtual Patching (1)
- Webinar (1)
- admission control (1)
- application security (1)
- container risk score (1)
- cpu optimization (1)
- crypto (1)
- data breach (1)
- dpi (1)
- grafana (1)
- linkerd2 (1)
- micro-perimeter (1)
- monitoring (1)
- pci (1)
- prometheus (1)
- rancher (1)
- real-time containers (1)
- sdlc (1)
- sensitive data (1)