Truemag

  • Subscribe
    • New Subscription
    • Account Updates
    • Customer Service
  • News & Events
    • News
    • Events
  • Advertise
    • Media Kit
    • Reprints
    • Contacts
  • Editorial
    • Podcasts
    • Current Articles
    • Digital Editions
    • eNewsletter
    • Editor’s Desk
    • Edit Calendar
    • Contacts
  • Buyers Guide
    • Search
    • Sponsor Index
    • Vendor Update
  • Annual Software Ranking
    • Ranking Form
    • Annual Software Ranking
    • 2018 Software Ranking File Package

NeuVector Announces New Container Risk Reports

5.13.19

NeuVector, the leader in container network security, today announced new capabilities to help container security teams better assess the security posture of their deployed services in production. New dashboard widgets and downloadable reports provide security risk scores for the most critical run-time attack risks: network-based attacks and vulnerability exploits in containers. Specifically, NeuVector now delivers an intelligent assessment of the risk of east-west attacks, ingress and egress connections, and damaging vulnerability exploits.

An overall risk score summarizes all available risk factors and provides advice on how to lower the threat of attack – thus improving the score. The service connection risk score shows how likely it is for attackers to move laterally (east-west) to probe containers that are not segmented by the NeuVector firewall rules. The ingress/egress risk score shows the risk of external attacks or outbound connections commonly used for data stealing or connecting to C&C (command and control) servers.

Additionally, the vulnerability exploit risk combines run-time scan results for containers with the protection mode of the container. If the container is protected by NeuVector’s whitelist rules for network segmentation and process profiling, then there is a lower risk of a vulnerability exploit spreading or critically damaging the service.

“The NeuVector container security solution spans the entire pipeline – from build to ship to run,” said Gary Duan, CTO, NeuVector. “Because of this, we are able to present an overall analysis of the risk of attack for containers during run-time. But not only can we help assess and reduce risk, we can actually take automated actions such as blocking network attacks, quarantining suspicious containers, and capturing container and network forensics.”

Furthermore, leveraging the industry’s tightest integration with Red Hat OpenShift, the risk assessments and reports are specific to the OpenShift projects and namespaces for each user. With this integration, individual users can review the risk scores and security posture for the containers within their assigned projects. They are able to see the impact of their improvements to security configurations and protections as they lower risk scores and remove potential vulnerabilities. The one-click RBAC integration requires no additional coding, scripting or configuration, and adds to other OpenShift integration points for admission control, image streams, OVS networking, and service deployments.

“We are seeing many business-critical container deployments using Red Hat OpenShift,” said Fei Huang, CEO, NeuVector. “These customers turn to NeuVector to provide complete run-time protection for in-depth defense – with the combination of container process and file system monitoring, as well as the industry’s only true layer-7 container firewall.”

Other useful new tools announced by NeuVector today include a summary of network application protocol usage and downloadable security reports.

Also an industry-first, NeuVector’s protocol usage analysis for containers shows the actual application protocols detected by NeuVector using layer-7 deep packet inspection and includes the network utilization in gigabytes for each protocol. These are useful for detecting unusual network patterns, unauthorized protocols, or for general application debugging.

www.neuvector.com

May 13, 2009Olivia Cahoon
Kaseya Ups the Ante with Powered Services 2.0DiscoverOrg and ZoomInfo Launch Data Enrichment Product
Product Centrics
TrueNAS Open Source Storage Platform brings Full Windows ACL Support to Linux

Fully featured Windows file system ACLs are well supported in TrueNAS 12.0 (CORE and Enterprise), but not generally supported by Linux. Thanks to some innovation, and sweat from the iXsystems engineering team, TrueNAS SCALE 21.08...

Driving Successful Digital Transformation Initiatives in 2022

Well, the end of the year is the perfect time to reflect on all the past year's activities and plan for the coming year. As we plan for 2022, one thing...

Recovery Platforms

Established in 2013, Imanis Data, previously Talena...

Data Driven Efficiency

Founded in 2003, Tableau is a public software company...

Updated Hitachi CRM

Building Product Manufacturers (BPM) require...

Quick Links
Untitled Document
SW500 SW500 SW500 SW500 SW500
2022 © Rockport Custom Publishing, LLC