Aporeto for IBM at a Glance
Gain immediate insights into your application dependencies across IBM and other public or private cloud environments.
Enforce per workload isolation/segmentation across IBM Cloud services and hybrid environments.
Reduce the burden in managing security groups for dynamic workloads.
Encrypt communications across all your applications.
How to deploy Aporeto in IBM:
Pick and application and visualize it
You can visualize the application of your choice by deploying Aporeto as a Kubernetes DaemonSet. If you control the virtual machines on which your application component run, you may also deploy Aporeto as a Docker container or a userland process.
Generate and simulate security policy
Aporeto auto-generates application security policy by ingesting Kubernetes Network Policies. You also have the option of leveraging your application dependency graph that Aporeto creates to describe the application’s behavioral intent as policies. In every case, you may audit and edit auto-generated policies.
Enforce the security policy
Once you have policies, you may simulate their enforcement at runtime to evaluate the effects of your security policies without interrupting operations. When satisfied that your security policies are solid, you may lockdown your application and protected it with a Zero Trust approach.