NFV NEWS

NFV Home

NeuVector Solution Addresses Container Security

By Paula Bernier January 31, 2017

Traditional approaches to network security don’t work in container environments, says NeuVector. That prompted the company to introduce a new security solution for the container world.

"In order for security teams to keep up with DevOps, they can't be running around inspecting IP tables and updating rules,” says NeuVector CEO Fei Huang. “What we've designed is a security container that is intelligent enough to understand – in real-time – what applications are doing. There's not a faster, easier, and more secure way to ensure Docker container environments are protected from unwanted or malicious traffic."

This solution actually is a security container for containers in production environments. It learns and whitelists normal behaviors. That helps it detect abnormalities when it scans applications, containers, and hosts. And it can block abnormal connections that could indicate a distributed denial of service, DNS, or other attack.

"NeuVector is a cool visualization and security tool for AWS containers," said Henrik Johansson, Security Solutions Architect at Amazon Web Services Inc. "[With NeuVector], you can map container connections and identify abnormal application behavior during run-time. This is especially useful when you have many applications and containers running across different EC2 instances."

We’re hearing a lot about container security lately. Among the solution providers in this space are Aporeto, Aqua Security, Black Duck Software, Twistlock, and Weaveworks.

Twistlock Inc. CEO Ben Bernstein in an interview with us last year, commented that there was room for innovation in container security.

“We think containers actually will have a profound impact on how security is achieved in the future,” he said. “Runtime security and software security are increasingly being blended together, which will actually make security more efficient and more effective.”

We also met late last year with Aporeto co-founder Amir Sharif, who talked about the startup’s Trireme solution.

“Trireme makes it possible to set up security policies at scale and segment applications by enforcing end-to-end authentication and authorization,” he explained. “There is no need for complex control planes or IP/port-centric ACLs and east-west firewalls.”




Edited by Stefania Viscusi

Executive Editor, TMC

SHARE THIS ARTICLE
Related Articles

Nokia Introduces SDAN Solution

By: Paula Bernier    10/10/2017

Nokia has unveiled a Software-Defined Access Network solution. This offering consists of cloud-native software, integration services, open programmabl…

Read More

Stating with Attestation, a Core Foundation of Computer Security for Sensitive Systems

By: Special Guest    10/3/2017

The European Telecommunication Standards Institute (ETSI) held their annual Security Week event and along with a representative from the UK National C…

Read More

Assuring Business Outcomes on Your DX Journey

By: Michael Segal    9/7/2017

When it comes to implementing strategies for digital transformation (DX), there are nearly as many methods as there are companies using them.

Read More

What is a Network Functions Platform?

By: Special Guest    8/21/2017

The Network Functions Platform is designed to provide enterprises, as well as MSPs and CSPs, with a seamless migration path towards NFV.

Read More

UNH-IOL Certifies Brain4Net's B4N SwitchOS

By: Paula Bernier    7/18/2017

Network functions virtualization and software-defined network solutions provider Brain4Net Inc. has announced that its B4N SwitchOS has been certified…

Read More