NFV NEWS

NFV Home

NeuVector Solution Addresses Container Security

By Paula Bernier January 31, 2017

Traditional approaches to network security don’t work in container environments, says NeuVector. That prompted the company to introduce a new security solution for the container world.

"In order for security teams to keep up with DevOps, they can't be running around inspecting IP tables and updating rules,” says NeuVector CEO Fei Huang. “What we've designed is a security container that is intelligent enough to understand – in real-time – what applications are doing. There's not a faster, easier, and more secure way to ensure Docker container environments are protected from unwanted or malicious traffic."

This solution actually is a security container for containers in production environments. It learns and whitelists normal behaviors. That helps it detect abnormalities when it scans applications, containers, and hosts. And it can block abnormal connections that could indicate a distributed denial of service, DNS, or other attack.

"NeuVector is a cool visualization and security tool for AWS containers," said Henrik Johansson, Security Solutions Architect at Amazon Web Services Inc. "[With NeuVector], you can map container connections and identify abnormal application behavior during run-time. This is especially useful when you have many applications and containers running across different EC2 instances."

We’re hearing a lot about container security lately. Among the solution providers in this space are Aporeto, Aqua Security, Black Duck Software, Twistlock, and Weaveworks.

Twistlock Inc. CEO Ben Bernstein in an interview with us last year, commented that there was room for innovation in container security.

“We think containers actually will have a profound impact on how security is achieved in the future,” he said. “Runtime security and software security are increasingly being blended together, which will actually make security more efficient and more effective.”

We also met late last year with Aporeto co-founder Amir Sharif, who talked about the startup’s Trireme solution.

“Trireme makes it possible to set up security policies at scale and segment applications by enforcing end-to-end authentication and authorization,” he explained. “There is no need for complex control planes or IP/port-centric ACLs and east-west firewalls.”




Edited by Stefania Viscusi

Executive Editor, TMC

SHARE THIS ARTICLE
Related Articles

Juniper Brings Self-Driving Network to MPLS + SDN + NFV World Congress

By: Frank Griffin    3/16/2017

Juniper Networks is going to bring its Self-Driving Network to the MPLS + SDN + NFV World Congress in Paris to highlight the need for automated networ…

Read More

Digital Transformation and the CIO Leadership Role

By: Michael Segal    3/15/2017

Brands and companies globally are moving further along the Digital Transformation (DX) journey, as their focus increasingly shifts from physical asset…

Read More

HPE and Red Hat Deliver More NFV Deployment Options

By: Michael Guta    3/13/2017

The collaboration between HPE and Red Hat is going to give communications service providers more options to make NFV deployments based on fully open, …

Read More

New Funding Gives Hedvig Edge in Software-Defined Storage Market

By: Michael Guta    3/7/2017

A new round of funding gives Hedvig a total of $52 million as it looks to expand software-defined storage (SDS) into Asia and develop end-to-end solut…

Read More

Why Businesses Must be Aware of the IoT Trojan Horse

By: Michael Segal    3/6/2017

From consumer gadgets and wearables, to connected cars and smart homes; awareness, understanding and adoption of IoT is growing quickly. Fields as div…

Read More