Quantcast
Channel: Amit Gupta, Author at Tigera
Browsing latest articles
Browse All 15 View Live

Tiger Secure Enterprise Edition 2.1 General Availability

Tigera delivers network security and compliance solution with Tiger Secure Enterprise Edition 2.1 I am very excited to announce the general availability of Tigera Secure Enterprise Edition 2.1 release....

View Article


What’s New in Calico v3.6

We are very excited to announce Calico v3.6. Here are some highlights from the release. Calico IPAM for Kubernetes API datastore With Calico v3.6, you now have full feature parity for Calico IP address...

View Article

Image may be NSFW.
Clik here to view.

Tigera Partners with Fortinet to Secure Kubernetes Environments and Joins the...

We are proud to partner with Fortinet and join their Fabric-Ready Technology Alliance Partner program. With this partnership, Fortinet customers will be able to extend their network security...

View Article

Now Available: Calico for Windows on Red Hat OpenShift Container Platform

Approximately one year ago, Kubernetes 1.14 made support of Windows containers running on Microsoft Windows Server nodes generally available. This was a declaration that Windows node support was...

View Article

Image may be NSFW.
Clik here to view.

Industry-First Pay-as-you-go SaaS Platform for Kubernetes Security and...

We are excited to introduce Calico Cloud, a pay-as-you-go SaaS platform for Kubernetes security and observability. With Calico Cloud, users only pay for services consumed and are billed monthly,...

View Article


Image may be NSFW.
Clik here to view.

Kubernetes observability challenges in cloud-native architecture

Kubernetes is the de-facto platform for orchestrating containerized workloads and microservices, which are the building blocks of cloud-native applications. Kubernetes workloads are highly dynamic,...

View Article

Troubleshooting microservices: Challenges and best practices

When people hear ‘microservices’ they often think about Kubernetes, which is a declarative container orchestrator. Because of its declarative nature, Kubernetes treats microservices as entities, which...

View Article

Vulnerability management: 3 best practices and tips for image building and...

As enterprises adopt containers, microservices, and Kubernetes for cloud-native applications, vulnerability management is crucial to improve the security posture of containerized workloads throughout...

View Article


Image may be NSFW.
Clik here to view.

Process monitoring: How you can detect malicious behavior in your containers

The default pod provisioning mechanism in Kubernetes has a substantial attack surface, making it susceptible to malevolent exploits and container breakouts. To achieve effective runtime security, your...

View Article


Kubernetes secrets management: 3 approaches and 9 best practices

Secrets, such as usernames, passwords, API tokens, and TLS certificates, contain confidential data that can be used to authenticate and authorize users, groups, or entities. As the name implies,...

View Article

WAF is woefully insufficient in today’s container-based applications: Here’s why

According to the Cloud Security Alliance, the average large enterprise has 946 custom applications deployed. Traditionally, organizations deployed Web Application Firewalls (WAF), which provide...

View Article

Image may be NSFW.
Clik here to view.

4 ways to leverage existing kernel security features to set up process...

The large attack surface of Kubernetes’ default pod provisioning is susceptible to critical security vulnerabilities, some of which include malicious exploits and container breakouts. I believe one of...

View Article

Overcoming Security Gaps with Active Vulnerability Management

Organizations can reduce security risks in containerized applications by actively managing vulnerabilities through scanning, automated image deployment, tracking runtime risk and deploying mitigating...

View Article


What is platform engineering and when should you invest in it?

As application platforms grow larger, the idea of DevOps teams where developers support the software development lifecycle, but also manage infrastructure and the platform, is beginning to reach the...

View Article

3 observability best practices for improved security in cloud-native...

Why is observability important for better security? Observability, especially in the context of cloud-native applications, is important for several reasons. First and foremost is security. By design,...

View Article

Browsing latest articles
Browse All 15 View Live