Aporeto Logo
Aporeto Logo

Aporeto, a Zero Trust security solution for microservices, containers and the cloud, collaborated with Red Hat, the world’s leading provider of open source solutions. Aporeto has completed Red Hat Container Certification and the resulting container has been published in the Red Hat Container Catalog.

With testing and certification complete, Aporeto containers are ready for production use on Red Hat OpenShift, Red Hat Enterprise Linux and Red Hat Atomic Host. Deploying fast to the cloud via cloud-native applications can require the rethinking of static, perimeter-centric security and moving to a Zero Trust security model. Aporeto secures cloud-native applications orchestrated by Red Hat OpenShift Container Platform in private, public, and hybrid cloud settings.

Red Hat OpenShift Container Platform is an enterprise-grade platform to deploy and manage cloud-native applications built on industry standards, including Linux containers, Kubernetes, and Red Hat Enterprise Linux. In addition to certifying for Red Hat OpenShift Container Platform, as an OpenShift Commons Member, Aporeto is committed to this community in which users, partners, customers, and contributors come together to collaborate on OpenShift.

On the podcast, Aporeto co-founder Amir Sharif talks about traditional network security as being inadequate for the cloud with host Chris Gregoire. Amir Sharif has 20 years of experience building data center products integrating OS, virtualization, networking, storage, low-latency I/O, and orchestration. Amir holds patents in RFID and distributed storage and received his MBA from UC Berkeley, where he was a Gloria Appel Entrepreneurial Fellow, a Hitachi Mu Chip Fellow, and Mayfield Fellow. He started his career as a mathematician and software engineer.

“Traditional network security is everything you’re familiar with. Think about East-West firewalls, access control lists, overlays” said Amir Sharif, Co-Founder, and VP of Business Development, Aporeto. “What they all have in common, is that they depend on IP addresses to provide the means by which they segment the network … IP addresses are like street addresses. They provide location information, not identity. The problem is that in the cloud, the location changes all the time, and that’s by design.”

Listen to the podcast episode here.

Recent Posts Key Security Concerns for a Kubernetes Deployment How We Prevented the Kubernetes API-Server Vulnerability Security Groups and their Pitfalls

Subscribe to Our Blog

x