Alcide

Tel Aviv, Israel
2016
Jan 6, 2021   |  By Alon Berger
Welcome to our seventh blog post on the Kubernetes threat vectors series. We are covering different tactics on the Kubernetes attack matrix, published by Microsoft and originally based on the MITRE ATT&CK framework. In this blog post, we will review the Credential Access tactic, and cover its techniques. The credential access tactic consists of techniques that are used by attackers to explore the environment to which they gained access.
Jan 4, 2021   |  By Alon Berger
Cloud security management challenges customers. That is according to Gartner, claiming that most cloud security failures are the end-users’ fault, not the providers. Considering the volatile landscape of cloud-native applications, even the smallest mistakes can lead to serious cybersecurity breaches and data leaks. Since more workloads move to the cloud, securing those cloud environments will get more complex.
Dec 31, 2020   |  By Alon Berger
Welcome to our sixth blog post on the Kubernetes threat vectors series. We are covering different tactics on the Kubernetes attack matrix, published by Microsoft and originally based on the MITRE ATT&CK framework. In this blog post, we will review the Credential Access tactic, and cover its techniques.
Dec 21, 2020   |  By Amir Ofek
A year ago, when we planned our strategy and had our predictions for 2020, we most definitely could not predict how erratic 2020 would turn out to be. We too had to adjust and provide support for our employees’ and clients’ new needs. However, 2020 turned out to be a tipping point year for the Kubernetes community with a massive K8s adoption across the globe.
Dec 17, 2020   |  By Alon Berger
Welcome to our fifth blog post on the Kubernetes threat vectors series. We are covering different tactics on the Kubernetes attack matrix, published by Microsoft and originally based on the MITRE ATT&CK framework. In this blog post, we will review the Defense Evasion tactic, and cover its techniques.
Dec 8, 2020   |  By Nitzan Niv
A new security issue was discovered in all Kubernetes versions and disclosed on December 8, 2020 (see Kubernetes CVE-2020-8554 Security Advisory). This security issue enables an attacker to intercept traffic from other pods (or nodes) in the cluster if the attacker can create or edit services and pods. The attack is rated medium (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
Dec 7, 2020   |  By Alon Berger
The process of image scanning typically refers to the act of parsing through packages and dependencies that are defined in a container image file, while trying to identify and detect whether there are any known vulnerabilities. Traditional image scanning tools mainly focus on auditing and tracking Common Vulnerabilities and Exposures (CVE), put together by well-established databases and formal organizations, such as the National Vulnerability Database (NVD) and MITRE knowledge base.
Dec 3, 2020   |  By Alon Berger
Welcome to our fourth blog post on the Kubernetes threat vectors series. We are covering different tactics on the Kubernetes attack matrix, published by Microsoft and originally based on the MITRE ATT&CK framework. In this blog post, we will review the Privilege Escalation tactic, and cover its techniques. What is Privilege Escalation? The privilege escalation tactic consists of techniques that are used by attackers to get higher privileges in the environment than those they currently have.
Dec 1, 2020   |  By Alon Berger
Kubernetes, as an open-source system for managing and orchestrating containerized applications, is widely used among numerous organizations and enterprises, looking for a better mechanism for deployment and scaling of applications. AWS has repeatedly kept innovating while providing its devoted customers with numerous supported services in any environment, whether it is on the cloud or on-premise.
Nov 26, 2020   |  By Alon Berger
Despite 2020 and its calamities, and the fact that this year’s KubeCon went virtual, it delivered yet again its fair share of new and innovative cloud-native technologies. After heaps of great sessions on Kubernetes and cloud-native projects and developments in general, we settled back into our daily routine and put together our key takeaways from this event.
Aug 5, 2020   |  By Alcide
Ian is a distinguished engineer and now the CEO of NanoVMs, a fully managed unikernel platform. In this session, we talked about what exactly is a unikernal platform, the future of Docker, K8s advanced network security, and more.
Jul 28, 2020   |  By Alcide
Intro and walkthrough of Alcide kAudit, an automated analysis tool for your Kubernetes audit logs. Watch & learn how to identify anomalous behaviour and suspicious activity patterns within your Kubernetes workloads.
Jun 12, 2020   |  By Alcide
Phil is a distinguished engineer & CTO, Container and Linux OS Architecture Strategy at IBM. In this video we talked about Docker, open source- the good, the bad and the ugly - as well as CNCF and tried to figure out if the KubeCon NA is still going to take place.
May 30, 2020   |  By Alcide
In this session we spoke with Vipin about serverless, unikernels and DevSecOps. We wanted to know what the future holds for containers, K8s and cloud-native in general, and how agility, portability and community have an impact on open source.
May 17, 2020   |  By Alcide
Spoiler: we learned about the importance of open source, creating a fantastic community, tech-first vs software that’s not vendor-driven, and more.
May 17, 2020   |  By Alcide
May 10, 2020   |  By Alcide
Kubernetes - Reducing Infrastructure Cost and Complexity In this session, Kevin will dive into the unique challenges of keeping your Kubernetes workloads highly available while keeping costs low. You will learn about how to leverage cloud-native autoscaling, pod requirement right-sizing, resource buffer definition, cost allocation and more.
Jan 7, 2020   |  By Alcide
What happens if a service exposes a NodePort? Or if a service Load Balancer is enabled? The rise of Kubernetes brought tons of developers to jump on the Kubernetes bandwagon, and yet, Kubernetes in production is still relatively new to most. Our top ten recommendations come from our real-world experience with configurations that made it to production but shouldn't have.
Dec 19, 2019   |  By Alcide
"44% of respondents are using Kubernetes in production today, compared to 20% in 2018. 53% use Kubernetes to improve application velocity and time-to-market, while 54% are still reluctant to claim they are comfortable running multiple Kubernetes clusters."
Apr 11, 2019   |  By Alcide
There are entire tool ecosystem, methodologies and endless resources to guide companies along their DevOps journey: asset Management, monitoring, and CI/CD integration to name a few. This ebook will take you through the KPIs you should either evaluate or revisit and examine what you should consider when measuring your DevOps success.
Mar 30, 2019   |  By Alcide
The benefits of the hybrid cloud and DevOps are both well known. But what happens when these two models intersect? Often DevOps and Security teams struggle to account for the added complexity introduced by hybrid configurations. But that needn't be so.
Mar 30, 2019   |  By Alcide
In order to help enterprises address cloud security issues effectively, platforms and stacks have emerged to automate, orchestrate, and simplify cloud security processes, providing greater visibility into them across the entire organisation.
Mar 1, 2019   |  By Alcide
The next generation of cloud-native technologies requires a new paradigm of security solutions that are cross-platform, unified to all cloud providers, support multiple attack vectors and have application- awareness context built-in.
Mar 1, 2019   |  By Alcide
With its soaring popularity, Kubernetes has become the de-facto orchestration tool for deploying and managing containerized applications. As with anything new, something of a Wild West atmosphere prevails while people are still learning the ins and outs, vulnerabilities, and best practices of the system.
Feb 1, 2019   |  By Alcide
In the last few months, disclosure of hardware-based vulnerabilities like Spectre, Meltdown, and Foreshadow in commonly-used data center infrastructure shook the technology industry. The new wave of attacks circumvents the most basic building blocks - like resources isolation and network segregation - and shakes our trust in the fundamental security of the modern data center.
Feb 1, 2019   |  By Alcide
GDPR is upon us. And while most organizations are aware of this fact, very few understand what it means for them or how it will affect their standard operating procedures. There's no need to guess and there's no need to panic. When it comes to data center and cloud operations, we've taken the liberty of breaking it down for you.
Jan 1, 2019   |  By Alcide
DNS is an infrastructure protocol that is ubiquitous and enabled in even the most restrictive networks. This makes DNS tunneling a highly effective two-way attack vector that is relatively simple to implement and performs well in terms of latency and bandwidth.

Alcide provides a cloud-native security platform from code to production to continuously secure workloads running in Kubernetes. Companies use Alcide to discover, manage, and secure their cloud deployments, resulting in a frictionless experience to ensure the security of their mission-critical apps.

Alcide is a cloud-native network security leader empowering DevSecOps teams to continuously secure and protect their growing multi-cluster Kubernetes deployments. By automatically discovering, managing and enforcing security policies, Alcide’s Microservices Firewall for K8s and Istio enables unified code-to-production enforcement of security policies spanning networks and workloads. This enables the smooth operation of business apps while protecting cloud deployments from malicious attacks.

Continuous Cloud Security the Alcide Way:

  • Continuous Dev-to-Production K8s Security: Alcide Dev-to-Production cloud-native security introduces a new approach to cloud security which provides a dedicated offering for each stage of the development pipeline.
  • Microservices Anomaly Detection: The Alcide platform provides a threat detection engine and offers protection against attacks that are either overlooked or undetected by traditional protection layers, including abnormal behaviors and security incidents such as DNS exfiltration, spoofing, poisoning, and lateral movement.
  • Topology Discovery of Distributed K8s and Cloud Environments: Alcide utilizes advanced visualization capabilities to provide panoramic, real-time views of distributed data centers from the infrastructure to application activity. Visibility uncovers operational and security blind spots while allowing for granular monitoring and management of both infrastructure and applications.

Cloud-Native First. Security Always.