NFV NEWS

NFV Home

NeuVector Solution Addresses Container Security

By Paula Bernier January 31, 2017

Traditional approaches to network security don’t work in container environments, says NeuVector. That prompted the company to introduce a new security solution for the container world.

"In order for security teams to keep up with DevOps, they can't be running around inspecting IP tables and updating rules,” says NeuVector CEO Fei Huang. “What we've designed is a security container that is intelligent enough to understand – in real-time – what applications are doing. There's not a faster, easier, and more secure way to ensure Docker container environments are protected from unwanted or malicious traffic."

This solution actually is a security container for containers in production environments. It learns and whitelists normal behaviors. That helps it detect abnormalities when it scans applications, containers, and hosts. And it can block abnormal connections that could indicate a distributed denial of service, DNS, or other attack.

"NeuVector is a cool visualization and security tool for AWS containers," said Henrik Johansson, Security Solutions Architect at Amazon Web Services Inc. "[With NeuVector], you can map container connections and identify abnormal application behavior during run-time. This is especially useful when you have many applications and containers running across different EC2 instances."

We’re hearing a lot about container security lately. Among the solution providers in this space are Aporeto, Aqua Security, Black Duck Software, Twistlock, and Weaveworks.

Twistlock Inc. CEO Ben Bernstein in an interview with us last year, commented that there was room for innovation in container security.

“We think containers actually will have a profound impact on how security is achieved in the future,” he said. “Runtime security and software security are increasingly being blended together, which will actually make security more efficient and more effective.”

We also met late last year with Aporeto co-founder Amir Sharif, who talked about the startup’s Trireme solution.

“Trireme makes it possible to set up security policies at scale and segment applications by enforcing end-to-end authentication and authorization,” he explained. “There is no need for complex control planes or IP/port-centric ACLs and east-west firewalls.”




Edited by Stefania Viscusi

Executive Editor, TMC

SHARE THIS ARTICLE
Related Articles

GENBAND Hits MWC With NFV Products

By: Steve Anderson    2/23/2017

GENBAND, commonly known for its work in real time communications, steps up to the NFV plate with a slate of collaborations at the upcoming MWC event.

Read More

Ericsson Helps Verizon Enterprise Orchestrate Business

By: Paula Bernier    2/21/2017

Verizon Enterprise Solutions will use solutions from Ericsson to help power its virtualized global managed network services, including SD-WAN. As a re…

Read More

ADVA Optical Launches FSP Network Hypervisor

By: Frank Griffin    2/21/2017

ADVA Optical Networking launches its FSP Network Hypervisor to extend software defined networking into the optical layer, which will make it a key com…

Read More

Corero Introduces 100gbps DDoS Mitigation Solution

By: Paula Bernier    2/17/2017

Security company Corero Networks has expanded its SmartWall distributed denial of service prevention solution with support for 100 gigabit per second …

Read More

Why Businesses Must Be Aware of the IoT Trojan Horse

By: Michael Segal    2/15/2017

The automation of industrial processes, benefits to healthcare and an ever more connected society are all signs of a positive impact from IoT. However…

Read More