Aporeto Logo
Aporeto Logo

Blog

Securing RedHat OpenShift Hybrid Workloads with Aporeto

Centrally Managed and Portable Security Policies for OpenShift-Orchestrated Kubernetes Clusters ...

Written By: Amir Sharif
Nov 08

AWS Container Security Use Cases with Aporeto ...

E-Xact are a credit card transaction gateway company that services some of North America’s ...

Written By: Amir Sharif
Nov 06

The Rise of Security for Microservices

The software industry has accelerated its shift towards microservices and has fully embraced ...

Written By: Maria Bledsoe
Nov 05

Secure your AWS EKS, ECS, and EC2 Workloads with ...

The Aporeto Zero Trust Security for microservices, containers, and the cloud is now on the AWS SaaS ...

Written By: Amir Sharif
Jul 27

Fueling successful adoption of cloud applications ...

It’s been a big week for cloud based applications with lots of announcements and activity at ...

Written By: Maria Bledsoe
Jul 25

Notes and Impressions from this year’s Red Hat ...

When it comes to IT, there are two types of companies:  A top-three cloud service provider and ...

Written By: Amir Sharif
May 16

Enterprises Are Becoming Cloud-Native, But It Is ...

The success and rapid development of the Kubernetes open source project is nothing short of ...

Written By: Amir Sharif
May 10

The Security Blast Radius in Cloud Native Applications

The term of blast radius has often been used to describe the effect of a security breach to an ...

Written By: Dimitri Stiliadis
Apr 17

Etherparty Enhances Security with Aporeto Ahead of ...

Etherparty Smart Contracts Inc. (“Etherparty”), a blockchain technology company providing smart ...

Written By: Maria Bledsoe
Apr 10

Aporeto Launches First Comprehensive Microservices ...

Aporeto Enterprise 2.0 Introduces Application Identity to Make Security Infrastructure Agnostic ...

Written By: Maria Bledsoe
Mar 27

How Aporeto Improves Security for Kubernetes Workloads

Security is formed around the knowledge of who is trying to gain access to an object, what they ...

Written By: Don Chouinard
Feb 28

AWS Part Two: Automatic, Enhanced Security for AWS ...

In part one of this blog we looked at the challenges involved when security for microservices is ...

Written By: Don Chouinard
Feb 26

AWS Part One: Why We Need Better Security for AWS ...

Migrating legacy workloads to the cloud and embracing containers for new cloud-native applications ...

Written By: Don Chouinard
Feb 21

The Move to the Cloud Part 3: Hybrid and Multi-Cloud ...

Today, we’re continuing our journey to the cloud. Our monolithic 3-tier application has been ...

Written By: Don Chouinard
Feb 19

The Move to the Cloud Part 2: Breaking Up the Monolith

Getting your first legacy monolithic application up and running at your cloud provider of choice is ...

Written By: Don Chouinard
Feb 14

The Move to the Cloud Part 1: Lift and Shift High ...

While there is much talk about cloud-native, 12-factor applications, the vast majority of ...

Written By: Don Chouinard
Feb 13

Google ALTS, a validation of Aporeto’s security ...

Google invests heavily in security for their internal infrastructure. They talk about their ...

Written By: Ariful Huq
Jan 31

Why I Joined Aporeto

In my 12 years of working in various roles information security, I have developed a strong bias ...

Written By: Jason Schmitt
Jan 30

Challenged with securing your cloud native ...

Coming out of AWS re:invent this year it is impressive to see the adoption of public cloud across ...

Written By: Ariful Huq
Dec 14

Trireme Kubernetes Update: Statistics, CSR, ...

The Aporeto team has been working hard on our open source Trireme Zero-Trust NetworkPolicy ...

Written By: Bernard
Dec 04

The Era of Application Fortification is Over

It is widely believed that medieval castles fell out of favor because of gunpowder, which could ...

Written By: Dimitri Stiliadis
Nov 24

Write Once, Run Securely Everywhere

Over the last years, we have witnessed tremendous innovation in microservices, containers, and ...

Written By: Dimitri Stiliadis
Nov 24

Scaling Down Kubernetes

Scaling Down is Often Harder One of the key characteristics of Kubernetes is scale. There are ...

Written By: Dimitri Stiliadis
Sep 27

Security’s #1 Problem: Economic Incentives

Read the full article on Dark Reading. The industry rewards cutting corners rather than making ...

Written By: Dimitri Stiliadis
Sep 26

Security For Docker Host Networks

Docker Host Networks Docker and most other container platforms have several networking options. In ...

Written By: Dimitri Stiliadis
Sep 19

Transparent Authorization for Linux Services

The Aporeto Trireme project provides the mechanism end-to-end authentication and authorization for ...

Written By: Dimitri Stiliadis
Sep 19

Cloud Native Apps and Security: The Case for CoreOS ...

Read the full article on Linux. CoreOS’s rkt started at the beginning of 2014 as a ...

Written By: Amir Sharif
Jun 21

Three Perspectives on the Evolution of Container ...

Listen to the full article by The New Stack Makers. There still exists a kind of chasm in the ...

Written By: Amir Sharif
Jun 09

Aporeto Scores $14.5M to Develop ‘Holy Grail of ...

Read the full article on SDX Central. Aporeto will soon launch its first commercial cloud security ...

Written By: Amir Sharif
May 24

Cisco’s first security GM, now a VC, talks about ...

Read the full article on Biz Dev. Matt Howard says he is very picky about his investments in ...

Written By: Amir Sharif
May 22

The Journey to Secure System Design

Aporeto’s mission is to provide the technologies and tools that will enable developers and ...

Written By: Dimitri Stiliadis
May 18

Aporeto Raises a Combined $14.5 Million of Funding ...

Company Launches Beta Program of Cloud-Native Security Solutions for the Developer-Driven ...

Written By: Amir Sharif
May 18

Aporeto and Red Hat Team Up to Secure OpenShift ...

Aporeto now secures OpenShift containers. Over 1,100 companies use Red Hat OpenShift,, making this ...

Written By: Amir Sharif
May 09

2017 Stevie® Award Winners

Read the full article on Stevie Awards. The following nominations were presented with Gold, Silver ...

Written By: Amir Sharif
May 03

TiE50 Awards Program Recognizing World’s Most ...

TiE50 is TiE Silicon Valley’s premier annual awards program keenly contested by thousands of ...

Written By: Amir Sharif
May 02

Red Hat Sets New Standard for Trusted, ...

Red Hat, Inc. (RHT), the world’s leading provider of open source solutions, today introduced the ...

Written By: Amir Sharif
May 02

Network security in the microservice environment

Read the full article on LWN. We have seen that a microservice architecture is intimately tied to ...

Written By: Amir Sharif
Apr 25

A Data-Driven Approach to Security Decision Making

Read the full article on Info Security. In a world where hard data and agents powered by Artificial ...

Written By: Stefano
Apr 25

What the Aporeto Trireme Project Means for the ...

Read the full article on Black Duck. With extensive experience in networking, security and cloud, ...

Written By: Amir Sharif
Mar 06

2016 Open Source Rookies of the Year

Read the full article on Black Duck. For nine years, the Black Duck Open Source Rookies of the Year ...

Written By: Amir Sharif
Feb 27

Black Duck Announces 2016 Open Source ‘Rookies of ...

  BURLINGTON, MA – February 27, 2017 – Black Duck, the global leader in automated ...

Written By: Amir Sharif
Feb 27

Telcos’ reluctance to harness new technology causing ...

Read the full article on Silicon Angle. With the 5G network being put into place and the ...

Written By: Amir Sharif
Feb 27

ActualTech Media RoadCast: Aporeto Fundamentals ...

The ActualTech Media RoadCast is an ongoing series of short videos wherein ActualTech Media ...

Written By: Amir Sharif
Feb 16

Aporeto Overview – Dimitri Stiliadis with Actual ...

  The ActualTech Media RoadCast is an ongoing series of short videos wherein ActualTech Media ...

Written By: Amir Sharif
Feb 16

9 Security Startups Worth Watching In 2017

Read the full article on SDX Central. In today’s data intensive world, companies large and small ...

Written By: Amir Sharif
Feb 14

Puppet Engineer: Peeking Inside Containers, You Find ...

Read the full article on The New Stack. Are the containerized applications you’re finally moving ...

Written By: Amir Sharif
Feb 09

What MSPs Must Have for Customer Cloud Security

Read the full article on Talk In Cloud. In outsourced cloud computing services, public cloud ...

Written By: Amir Sharif
Feb 08

Aporeto CEO to Participate in Container Security Panel ...

  SAN JOSE –February 8, 2017 – Aporeto, the company that brings together developers, ...

Written By: Amir Sharif
Feb 08

The Developer is an Investment, Not an Employee

It does not matter how you think about yourself or how good you may be at your job: Most employers ...

Written By: Amir Sharif
Feb 07

How Context Provides the Missing Piece of the Puzzle ...

Read the full article on The New Stack. When it comes to security, context is king. In our recent ...

Written By: Amir Sharif
Feb 06

6 Container Themes to Track in 2017

Read the full article on SDX Central. Early on, containers were flagged as possible security risks, ...

Written By: Amir Sharif
Dec 28

Cloud, Containers, IoT & More: 10 Startups to ...

Read the full article on SDX Central. Aporeto is a 1-year-old startup that has taken a surprisingly ...

Written By: Amir Sharif
Dec 26

The Maritime Future of IT?

Read the full article on Actual Tech. Just as the trireme (a kind of Greek warship) is an evolution ...

Written By: Amir Sharif
Dec 23

The Power of Hypervisor-Based Containers

Read the full article on The New Stack. The modern trend towards cloud-native apps seems to be set ...

Written By: Stefano
Dec 22

Why AWS Is Good for You (Until It Is Not)

Read the full article on The New Stack. Standing in the lobby of a well-known technology company ...

Written By: Amir Sharif
Dec 22

From Network Policies to Security Policies

Read the full article on the Kubernetes blog. Kubernetes supports a new API for network policies ...

Written By: Bernard
Dec 08

Dirty Cow: Story of a privilege escalation ...

As the dust is settling after Dirty COW was made public on the 19th of October, it is time to ...

Written By: Stefano
Dec 06

Aporeto Addresses Security for Cloud-Native ...

Read the full article on Devs World. When it comes to security, everybody else in the marketplace ...

Written By: Amir Sharif
Nov 29

Security is Critical for Open Source Projects

Read the full article on SDX Central. More enterprises are making increased usage of open source ...

Written By: Stefano
Nov 29

Trireme Secures Containers

Trireme OS project aims to secure ...

Written By: Amir Sharif
Nov 24

Virtualization Innovations for Securing Containers: ...

As Docker and other container runtimes are growing their user base, the merits and the weaknesses ...

Written By: Amir Sharif
Nov 12

Aporeto Secures Kubernetes Workloads with Labeling and ...

Read the full article on The New Stack. Aporeto advanced an architecture whose purpose is to enable ...

Written By: Amir Sharif
Nov 12

New open source project Trireme aims to secure ...

Read the full article on Network World.Trireme takes an application-centric, rather than a ...

Written By: Amir Sharif
Nov 04

Aporeto unveils whitelist security model for ...

Read the full article on Silicon Angle. A cloud-native security startup today introduced what it ...

Written By: Amir Sharif
Nov 04

Setting Sail on Secret Seas with Trireme

Read the full article on Networking Nerd. Container networking is a tough challenge to solve. The ...

Written By: Amir Sharif
Nov 04

Aporeto Announces Trireme Open-Source Security Project ...

Read the full article on DevopsDigest. Aporeto announced Trireme, an open-source security project ...

Written By: Amir Sharif
Nov 02

eweek: Trireme Open-Source Security Project Debuts for ...

Read the full article on eWeek. Network isolation isn’t the only way to secure application ...

Written By: Amir Sharif
Nov 01

Aporeto Thinks Container Security Can Really Be This ...

A startup whose founders include the former CTO of Nuage Networks has taken a radically simple ...

Written By: Amir Sharif
Nov 01

Trireme Architecture

Read the full article on GitHub. Trireme takes a different approach to application segmentation by ...

Written By: Dimitri Stiliadis
Nov 01

Secure Application Segmentation

The concept of segmentation, or separating applications in different domains, is one of the most ...

Written By: Dimitri Stiliadis
Nov 01

Trireme: Open Source Application Segmentation For ...

Today, Aporeto is releasing Trireme, an open source project for segmenting cloud-native ...

Written By: Amir Sharif
Nov 01

Caesar’s Story: Micro-bursting Cloud Security ...

The day started like most other June days in Phoenix. For Caesar, who owned a small t-shirt ...

Written By: Amir Sharif
Sep 29

Trust-Centric Security: Authentication and ...

I am not aware of any person who, simply by virtue of geolocation, makes trusts decisions at the ...

Written By: Amir Sharif
Aug 10

It’s An Official Trend: Microservices On The Rise ...

The software industry has accelerated its shift towards microservices and has fully embraced ...

Written By: Amir Sharif
Jul 24

Accelerating Business: DevOps and Microservices | Part ...

You have been riding a bicycle for a few years and have become good at it.  You’ve learned to ...

Written By: Amir Sharif
Jul 11

Accelerating Business: DevOps and Microservices | Part ...

There is a general truth about better competitors.  This truth applies at any scale.  It applies ...

Written By: Amir Sharif
Jun 26

Surviving the Zombie Apocalypse, AKA Software Security ...

Take a look at our article in the Cloud Computing Journal this week providing insights into what ...

Written By: Stefano
Jun 07

The Quest for Segmentation

One of the most widely deployed security practices is “segmentation”, or the process of ...

Written By: Dimitri Stiliadis
Jun 01

A Quest For Trust

It has been a common wisdom that good security depends on a solid wall.  That wisdom is reflected ...

Written By: Dimitri Stiliadis
May 06
x