x

development preferences

how can we help you secure your cloud applications?

Migrating legacy workloads to the cloud and embracing containers for new cloud-native applications provides agility and compelling cost benefits. However, securing these workloads from external and internal attacks is problematic at best, resulting in painful security breaches that threaten enterprises on an all-too-frequent basis. We need a solution that increases both security and the visibility of the security posture of applications, while simplifying operations for hybrid cloud workloads. AWS Security…

Today, we’re continuing our journey to the cloud. Our monolithic 3-tier application has been deployed onto a public cloud provider such as AWS, Azure or Google. We have already begun the process of decomposing the monolith into distributed microservices, which may run on on-premises or in clouds. Hybrid or Multi Cloud Security Zones Securing microservices in hybrid or multi-cloud environments is challenging because firewall rules may need to be created…

Getting your first legacy monolithic application up and running at your cloud provider of choice is the beginning of a multi-step journey. You’re on the way to taking advantage of the latest advancements in computer science to increase your competitive standing and better serve your customers and employees. Once the monolithic application has been successfully deployed into the cloud, it’s time to think about breaking it up into microservices, to…

Migrating legacy workloads to the cloud and embracing containers for new cloud-native applications provides agility and compelling cost benefits. However, securing these workloads from external and internal attacks is problematic at best, resulting in painful security breaches that threaten enterprises on an all-too-frequent basis. We need a solution that increases both security and the visibility of the security posture of applications, while simplifying operations for hybrid cloud workloads. AWS Security…

Today, we’re continuing our journey to the cloud. Our monolithic 3-tier application has been deployed onto a public cloud provider such as AWS, Azure or Google. We have already begun the process of decomposing the monolith into distributed microservices, which may run on on-premises or in clouds. Hybrid or Multi Cloud Security Zones Securing microservices in hybrid or multi-cloud environments is challenging because firewall rules may need to be created…

Getting your first legacy monolithic application up and running at your cloud provider of choice is the beginning of a multi-step journey. You’re on the way to taking advantage of the latest advancements in computer science to increase your competitive standing and better serve your customers and employees. Once the monolithic application has been successfully deployed into the cloud, it’s time to think about breaking it up into microservices, to…

In my 12 years of working in various roles information security, I have developed a strong bias towards implementing security that is very close to the thing you’re trying to protect.  You either need to build security in before you ship something, or completely trust the security that you’re going to end up depending on. As more organizations move aggressively to the cloud and accelerate their adoption of speed-enabling technologies…

The Aporeto team has been working hard on our open source Trireme Zero-Trust NetworkPolicy implementation for Kubernetes.

It is widely believed that medieval castles fell out of favor because of gunpowder, which could force a cannonball through stone walls. This isn’t quite true. Fortifications could protect castles from cannon fire, but changing political structures and populations spreading to more remote areas made castles impractical to defend the way people wanted to live and rule. Application security is going through a similar change now. It isn’t a new…

Read the full article on Dark Reading. The industry rewards cutting corners rather than making software safe. Case in point: the Equifax breach. There is plenty of blame to go around after the Equifax incident, and I’m not trying to be an apologist for the credit rating company. The problem is that the wrong incentives are driving software development. Unless we change the incentives, security will continue to be a…

The Aporeto Trireme project provides the mechanism end-to-end authentication and authorization for containers and Linux services. In this series of posts, we discuss several features of Trireme and how they can be used to secure a cloud infrastructure. Trireme associates a contextual identity with every application and uses this identity to transparently insert authentication and authorization in any communication between applications. Through this mechanism, it achieves detailed access control in…

Aporeto’s mission is to provide the technologies and tools that will enable developers and security operations teams to deploy secure distributed systems.  Cybersecurity incidents are threatening critical infrastructure, and we have been ignoring the root source of security problems for years. Our goal at Aporeto is to contribute to a fundamental but necessary shift in how we approach secure system designs. Today we announced our Series A Investment round of…

Read the full article on Dark Reading. The industry rewards cutting corners rather than making software safe. Case in point: the Equifax breach. There is plenty of blame to go around after the Equifax incident, and I’m not trying to be an apologist for the credit rating company. The problem is that the wrong incentives are driving software development. Unless we change the incentives, security will continue to be a…

Read the full article on Biz Dev. Matt Howard says he is very picky about his investments in digital security and outlines the three areas he is watching closely. One of them led to an investment in a San Jose startup last week.

Read the full article on Stevie Awards. The following nominations were presented with Gold, Silver or Bronze Stevie® Award winners in the 11th annual Stevie Awards for Sales & Customer Service. Ten Grand Stevie Award winners were also announced.  The awards were presented during a gala banquet at Caesars Palace in Las Vegas, Nevada on Friday, February 24.

x