Containers Library - Security Boulevard

AWS Security Case Study: Visibility into Containers Provides Application Context

Poka is a connected worker application built specifically for manufacturers. It brings together collaboration, training, and skills management into a single integrated platform to empower factory workers to learn continuously and solve problems autonomously. Designed from the ground-up as a cloud native application, Poka lets companies build their own proprietary knowledge base to use and..
Read more

Container Security 101

Containers have become a standard in development environments — for many reasons. But if not properly secured, they can increase security risks for cloud native applications and data. This e-book explores the fundamentals of container security, and explains clearly what every organization needs to know about images, registries, orchestrators and more.  
Read more

Container Security 101: Understanding the Basics of Securing Containers

By now it’s apparent to cybersecurity teams everywhere that the proverbial container genie is out of the bottle. Developers have widely embraced containers because they make building and deploying so-called cloud native applications simpler than ever. Not only do containers eliminate much of the friction typically associated with moving application code from testing through to..
Read more

Container Security: Securing from Within

Containers increase speed, simplify operations, improve development efficiency and bring a slew of other benefits, making them a top choice for agile deployment infrastructure. Everything from web apps, services, data stores, command line apps, desktop apps and other Linux programs can easily be packaged within containers. However, issues regarding their security have grown. Unsecured containers..
Read more

Run-Time Container Security Guide

This guide is brought to you by NeuVector, the leader in Application-aware Run-time Container Security. Discover running applications, services and processes, and apply the built-in security policies for them. Monitor running containers for violations, threats, and vulnerabilities, and protect your containers from suspicious activity with no manual policies required.
Read more