San Francisco, CA, USA
Jun 11, 2020   |  By John Armstrong
What is Lateral Movement? Lateral movement refers to the techniques that a cyber-attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets. Lateral movement techniques are widely used in sophisticated cyber-attacks such as advanced persistent threats (APTs).
Jun 1, 2020   |  By John Armstrong
As a leading, open-source multi-cluster orchestration platform, Rancher lets operations teams deploy, manage and secure enterprise Kubernetes. Rancher also gives users a set of CNI options to choose from, including open-source Project Calico.
May 27, 2020   |  By John Armstrong
New applications and workloads are constantly being added to Kubernetes clusters. Those same apps need to securely communicate with resources outside the cluster behind a firewall or other control point. Firewalls require a consistent IP, but routable IPs are a limited resource that can be quickly depleted if applied to every service.
May 18, 2020   |  By John Armstrong
As our enterprise customers build out large, multi-cluster Kubernetes environments, they are encountering an entirely new set of security challenges, requiring solutions that operate at scale and can be deployed both on-premises and across multiple clouds.
May 12, 2020   |  By Pervez Sikora
Welcome to the May 2020 edition of Calicomm! – our monthly newsletter for customers and partners. In the April edition, we discussed audit logs. This edition covers egress access control, which is an important aspect of micro-segmentation.
Feb 26, 2019   |  By Tigera
Discover how Tigera can help you achieve a scalable, secure, and compliant approach to containers on AWS.
Feb 26, 2019   |  By Tigera
This whitepaper explains five best practices to help meet network security and compliance requirements for modern microservices stack.
Feb 1, 2019   |  By Tigera
This guide contains detailed technical instructions on how to install and configure network security on Kubernetes platforms.
Jan 1, 2019   |  By Tigera
Tigera commission an unbiased, third-party research firm to speak with enterprise security professionals to understand the state of network security with modern applications.
Dec 1, 2018   |  By Tigera
OpenShift provides a declarative, automated platform to integrate developer workflows into application deployments leveraging open source building blocks such as Kubernetes.
Jun 23, 2020   |  By Tigera
Within the Kubernetes ecosystem, the Operator Pattern aims to encode the tasks that human operators perform with installing, maintaining, and upgrading infrastructure. It goes beyond manifests and Helm charts to add additional logic to manage critical services. Starting with the 3.15 release, Project Calico will provide an operator for managing Calico installations on Kubernetes clusters.
Jun 18, 2020   |  By Tigera
Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databases or other resources protected behind firewalls. Tigera and Fortinet have joined forces to solve this operational challenge. With the combination of FortiGate Next-Gen firewalls and Calico Enterprise, you gain full visibility into the container environment and can define fine-grained policies to determine which Kubernetes workloads are allowed to talk to the enterprise’s crown jewels running outside the Kubernetes cluster.
Jun 18, 2020   |  By Tigera
In this session, we’ll review networking options compatible with Calico for AKS cluster and will build a few AKS clusters using Azure CLI and ARM template.
Jun 18, 2020   |  By Tigera
Kubernetes Network Policy is the native way to implement network security controls in Kubernetes. Calico Policy is a superset of Kubernetes Network Policy that adds additional capabilities that help meet common real-world use cases. In this talk, we will educate you on the basics of Kubernetes Network Policy, the differences with Calico Policy, example use cases, and demos. You’ll walk away from this session with knowledge that will help you decide which network policy is right for you.
Jun 9, 2020   |  By Tigera
Amazon EKS announced the ability to use alternative CNIs to their AWS CNI. Calico is one option the will provide better IP address management among other benefits that can reduce resource exhaustion in EKS.