Aporeto Blog

May 18, 2017

The Journey to Secure System Design

Aporeto’s mission is to provide the technologies and tools that will enable developers and security operations teams to deploy secure distributed systems.  Cybersecurity incidents are threatening critical infrastructure, and we have been […]
May 18, 2017

Aporeto Raises a Combined $14.5 Million of Funding from Wing Venture Capital and Norwest Venture Partners to Deliver Simpler, Stronger, More Scalable Cloud-Native Security

Company Launches Beta Program of Cloud-Native Security Solutions for the Developer-Driven Enterprise SAN JOSE, Calif. – May 18, 2017 – Aporeto, Inc., an innovation leader in cloud-native security, announced today that it […]
May 9, 2017

Aporeto and Red Hat Team Up to Secure OpenShift Environments

 Over 1,100 companies use Red Hat OpenShift,, making this platform the dominant distribution of kubernetes in the market.  Specifically, OpenShift orchestrates docker containers with Kubernetes as a DevOps tool for a higher […]
April 25, 2017
In a world where hard data and agents powered by Artificial Intelligence algorithms increasingly drive decisions, we do not have a way to measure ‘security’ in a software solution quickly. There are […]
February 7, 2017

The Developer is an Investment, Not an Employee

It does not matter how you think about yourself or how good you may be at your job: Most employers see you as a cost center, aka an employee. You should be […]
December 6, 2016

Dirty Cow: Story of a privilege escalation vulnerability

As the dust is settling after Dirty COW was made public on the 19th of October, it is time to reflect on why it happened and what can be done to mitigate […]
November 12, 2016

Virtualization Innovations for Securing Containers: Aporeto at the BayLISA Meetup

As Docker and other container runtimes are growing their user base, the merits and the weaknesses of Linux containers as a technology for isolation are under scrutiny. Due to the large surface […]
November 1, 2016

Trireme: Open Source Application Segmentation For Kubernetes

Today, Aporeto is releasing Trireme, an open source project for segmenting cloud-native applications orchestrated by Kubernetes.  We built Trireme to be simple, scalable, and secure, and to point the way to how […]
September 29, 2016

Caesar’s Story: Micro-bursting Cloud Security Services

The day started like most other June days in Phoenix. For Caesar, who owned a small t-shirt printing business on the outskirts of town, getting up at 6am wasn’t hard. Heading to […]
August 10, 2016

Trust-Centric Security: Authentication and Authorization

I am not aware of any person who, simply by virtue of geolocation, makes trusts decisions at the office.  An office has walls and partitions to offer security and protection; yet, despite […]
July 24, 2016

It’s An Official Trend: Microservices On The Rise (But Companies Still In The Rut Of Old-Fashioned Security)

The software industry has accelerated its shift towards microservices and has fully embraced distributed, cloud native apps.  Because existing application security models were designed for a different era, they are woefully inadequate, […]
July 11, 2016

Accelerating Business: DevOps and Microservices | Part II: Running Safer

You have been riding a bicycle for a few years and have become good at it.  You’ve learned to ride fast but, confined by technological limitations, you cannot go any faster.  Over […]
June 26, 2016

Accelerating Business: DevOps and Microservices | Part I: Running Faster

There is a general truth about better competitors.  This truth applies at any scale.  It applies to cultures, nations, companies, teams, and individuals.   That truth is that better competitors are faster and […]
June 7, 2016

Surviving the Zombie Apocalypse, AKA Software Security Principles

Take a look at our article in the Cloud Computing Journal this week providing insights into what an OS “attack surface” is and how to minimize security risks.  Think of it this way: […]
June 1, 2016

The Quest for Segmentation

One of the most widely deployed security practices is “segmentation”, or the process of separating end-points in different trust domains and controlling interactions between those domains through policy rules. Segmentation manages information […]
//]]>