Blog
Network Insight.

docker security options

Docker Security Options

So you are currently in the Virtual Machine world and considering the transition to a containerized environment as you want to smoothen your application pipeline and gain the benefits of a Docker containerized environment. But you have heard from many the containers are insecure, run by root by default, and …

defined perimeter

Although organizations realize the need to upgrade their approach to user access control. The deployment of existing technologies is holding back the introduction of Software Defined Perimeter (SDP). A recent report carried out by the Cloud Security Alliance (CSA) on the “State of Software Defined Perimeter” states that the main …

Zero Trust Access

The foundations that support our systems are built with connectivity and not security as an essential feature. TCP connects before it authenticates. Security policy and user access based on IP lack context and allow architectures that exhibit overly permissive access. Most likely, this will result in a brittle security posture …

Our digital environment has been transformed significantly. Unlike earlier times, we now have a bunch of different devices, access methods, and types of users accessing applications from a variety of locations. This makes it more difficult to know which communications can be trusted. The perimeter-based approach to security can no …

Intent-based networking is not just hype. It is a necessary development and from a technology standpoint, it has now arrived. However, cultural acceptance will take a little longer.  Organizations are looking to modernize their business processes and their networks. Yet, the traditional vertically integrated monolithic networking solutions prohibit the network …

kubernetes security best practice

Kubernetes has quickly become the de facto orchestration tool for deploying microservices and containers to the cloud. It offers a way of running groups of resources as a cluster and provides a completely different abstraction level to single container deployments, allowing better management. From a developer’s perspective, it allows the …

There has been tremendous growth in the adoption of the software-defined perimeter (SDP) over the last few years. This has resulted in SDP becoming a disruptive technology, especially when it comes to replacing, or working together with the existing virtual private network. Why? Because the steps that software-defined perimeter proposes …

Not everything in Software-Defined Perimeter (SDP) is new Even though we are looking at disruptive technology to replace the virtual private network and offer secure segmentation. One thing to keep in mind with zero trust and software-defined perimeter (SDP) is that it’s not based on entirely new protocols. So we …

The zero trust framework for networking and security is here for a very good reason. There is a variety of bad actors: ranging from the opportunistic and targeted, to state-level and all are well prepared to find ways to penetrate a hybrid network. As a result, there is now a …

Today, organizations cannot know when and where the next attack is going to surface and how much damage it will cause. The risk is compounded by the fact that castle-and-moat security no longer exists. Network perimeters are fluid, with no clear demarcation points between “outside” and dangerous, and safely “inside.” …

We have seen a major evolution in technology where network functions can run in software on non-proprietary commodity hardware, be it a grey box or white box deployment model. Taking network functions from a physical appliance and putting them into a virtual appliance is only half the battle. The move …

Stateless Network Functions

There is a need for new technology and it’s time to break the tight state and processing. The involves the decoupling of the existing design of network functions into a stateless processing component along with a data store layer. Doing this and breaking the tight coupling enables a more elastic …