San Francisco, CA, USA
Jun 11, 2020 | By John Armstrong
What is Lateral Movement? Lateral movement refers to the techniques that a cyber-attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets. Lateral movement techniques are widely used in sophisticated cyber-attacks such as advanced persistent threats (APTs).
Jun 1, 2020 | By John Armstrong
As a leading, open-source multi-cluster orchestration platform, Rancher lets operations teams deploy, manage and secure enterprise Kubernetes. Rancher also gives users a set of CNI options to choose from, including open-source Project Calico.
May 27, 2020 | By John Armstrong
New applications and workloads are constantly being added to Kubernetes clusters. Those same apps need to securely communicate with resources outside the cluster behind a firewall or other control point. Firewalls require a consistent IP, but routable IPs are a limited resource that can be quickly depleted if applied to every service.
May 18, 2020 | By John Armstrong
As our enterprise customers build out large, multi-cluster Kubernetes environments, they are encountering an entirely new set of security challenges, requiring solutions that operate at scale and can be deployed both on-premises and across multiple clouds.
Feb 26, 2019 | By Tigera
This whitepaper explains five best practices to help meet network security and compliance requirements for modern microservices stack.
Feb 1, 2019 | By Tigera
This guide contains detailed technical instructions on how to install and configure network security on Kubernetes platforms.
Jan 1, 2019 | By Tigera
Tigera commission an unbiased, third-party research firm to speak with enterprise security professionals to understand the state of network security with modern applications.
Dec 1, 2018 | By Tigera
OpenShift provides a declarative, automated platform to integrate developer workflows into application deployments leveraging open source building blocks such as Kubernetes.
Jun 23, 2020 | By Tigera
Within the Kubernetes ecosystem, the Operator Pattern aims to encode the tasks that human operators perform with installing, maintaining, and upgrading infrastructure. It goes beyond manifests and Helm charts to add additional logic to manage critical services. Starting with the 3.15 release, Project Calico will provide an operator for managing Calico installations on Kubernetes clusters.
Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databases or other resources protected behind firewalls. Tigera and Fortinet have joined forces to solve this operational challenge. With the combination of FortiGate Next-Gen firewalls and Calico Enterprise, you gain full visibility into the container environment and can define fine-grained policies to determine which Kubernetes workloads are allowed to talk to the enterprise’s crown jewels running outside the Kubernetes cluster.
Kubernetes Network Policy is the native way to implement network security controls in Kubernetes. Calico Policy is a superset of Kubernetes Network Policy that adds additional capabilities that help meet common real-world use cases. In this talk, we will educate you on the basics of Kubernetes Network Policy, the differences with Calico Policy, example use cases, and demos. You’ll walk away from this session with knowledge that will help you decide which network policy is right for you.
Jun 9, 2020 | By Tigera
Amazon EKS announced the ability to use alternative CNIs to their AWS CNI. Calico is one option the will provide better IP address management among other benefits that can reduce resource exhaustion in EKS.
- June 2020 (10)
- May 2020 (14)
- April 2020 (7)
- March 2020 (6)
- February 2020 (2)
- January 2020 (1)
- December 2019 (3)
- November 2019 (3)
- October 2019 (5)
- September 2019 (4)
- August 2019 (3)
- July 2019 (10)
- June 2019 (10)
- May 2019 (10)
- April 2019 (8)
- March 2019 (11)
- February 2019 (9)
- January 2019 (9)
- December 2018 (3)
- November 2018 (3)
- October 2018 (4)
- September 2018 (1)
- August 2018 (1)
- July 2018 (3)
- May 2018 (1)