Aporeto Logo
Aporeto Logo

Security for Microservices & Containers

Secure your AWS EKS, ECS, and EC2 Workloads with ...

The Aporeto Zero Trust Security for microservices, containers, and the cloud is now on the AWS SaaS ...

Written By: Amir Sharif
Jul 27

Fueling successful adoption of cloud applications ...

It’s been a big week for cloud based applications with lots of announcements and activity at ...

Written By: Maria Bledsoe
Jul 25

Notes and Impressions from this year’s Red Hat ...

When it comes to IT, there are two types of companies:  A top-three cloud service provider and ...

Written By: Amir Sharif
May 16

Etherparty Enhances Security with Aporeto Ahead of ...

Etherparty Smart Contracts Inc. (“Etherparty”), a blockchain technology company providing smart ...

Written By: Maria Bledsoe
Apr 10

Aporeto Launches First Comprehensive Microservices ...

Aporeto Enterprise 2.0 Introduces Application Identity to Make Security Infrastructure Agnostic ...

Written By: Maria Bledsoe
Mar 27

How Aporeto Improves Security for Kubernetes Workloads

Security is formed around the knowledge of who is trying to gain access to an object, what they ...

Written By: Don Chouinard
Feb 28

Why I Joined Aporeto

In my 12 years of working in various roles information security, I have developed a strong bias ...

Written By: Jason Schmitt
Jan 30

Trireme Kubernetes Update: Statistics, CSR, ...

The Aporeto team has been working hard on our open source Trireme Zero-Trust NetworkPolicy ...

Written By: Bernard
Dec 04

The Era of Application Fortification is Over

It is widely believed that medieval castles fell out of favor because of gunpowder, which could ...

Written By: Dimitri Stiliadis
Nov 24

Write Once, Run Securely Everywhere

Over the last years, we have witnessed tremendous innovation in microservices, containers, and ...

Written By: Dimitri Stiliadis
Nov 24

Scaling Down Kubernetes

Scaling Down is Often Harder One of the key characteristics of Kubernetes is scale. There are ...

Written By: Dimitri Stiliadis
Sep 27

Security For Docker Host Networks

Docker Host Networks Docker and most other container platforms have several networking options. In ...

Written By: Dimitri Stiliadis
Sep 19

The Journey to Secure System Design

Aporeto’s mission is to provide the technologies and tools that will enable developers and ...

Written By: Dimitri Stiliadis
May 18

Aporeto Raises a Combined $14.5 Million of Funding ...

Company Launches Beta Program of Cloud-Native Security Solutions for the Developer-Driven ...

Written By: Amir Sharif
May 18

Aporeto and Red Hat Team Up to Secure OpenShift ...

Aporeto now secures OpenShift containers. Over 1,100 companies use Red Hat OpenShift,, making this ...

Written By: Amir Sharif
May 09

The Developer is an Investment, Not an Employee

It does not matter how you think about yourself or how good you may be at your job: Most employers ...

Written By: Amir Sharif
Feb 07

Trireme Architecture

Read the full article on GitHub. Trireme takes a different approach to application segmentation by ...

Written By: Dimitri Stiliadis
Nov 01

Secure Application Segmentation

The concept of segmentation, or separating applications in different domains, is one of the most ...

Written By: Dimitri Stiliadis
Nov 01

Trireme: Open Source Application Segmentation For ...

Today, Aporeto is releasing Trireme, an open source project for segmenting cloud-native ...

Written By: Amir Sharif
Nov 01

Caesar’s Story: Micro-bursting Cloud Security ...

The day started like most other June days in Phoenix. For Caesar, who owned a small t-shirt ...

Written By: Amir Sharif
Sep 29

Trust-Centric Security: Authentication and ...

I am not aware of any person who, simply by virtue of geolocation, makes trusts decisions at the ...

Written By: Amir Sharif
Aug 10

It’s An Official Trend: Microservices On The Rise ...

The software industry has accelerated its shift towards microservices and has fully embraced ...

Written By: Amir Sharif
Jul 24

Accelerating Business: DevOps and Microservices | Part ...

You have been riding a bicycle for a few years and have become good at it.  You’ve learned to ...

Written By: Amir Sharif
Jul 11

Accelerating Business: DevOps and Microservices | Part ...

There is a general truth about better competitors.  This truth applies at any scale.  It applies ...

Written By: Amir Sharif
Jun 26

The Quest for Segmentation

One of the most widely deployed security practices is “segmentation”, or the process of ...

Written By: Dimitri Stiliadis
Jun 01

A Quest For Trust

It has been a common wisdom that good security depends on a solid wall.  That wisdom is reflected ...

Written By: Dimitri Stiliadis
May 06
x