Aqua Launches New Commercial Kubernetes Security Solution on Google Cloud Platform Marketplace
July 26, 2018

Aqua Security is introducing a commercial Kubernetes application to all users of the Google Cloud Platform Marketplace (GCP Marketplace).

The new offering provides customers with Aqua's enterprise-class container security platform available in hourly per-node consumption pricing, making it much simpler to protect applications quickly with no up-front investment. For the first time ever, commercial Kubernetes applications are available to deploy with one click to Google Kubernetes Engine with a usage-based pricing model. Commercial Kubernetes applications can be deployed on-premise or even on other public clouds through the GCP Marketplace.

GCP Marketplace is based on a multi-cloud and hybrid-first philosophy, focused on giving Google Cloud partners and enterprise customers flexibility without lock-in. It also helps customers innovate by easily adopting new technologies from ISV partners, such as commercial Kubernetes applications, and allows companies to oversee the full lifecycle of a solution, from discovery through management.

The full-featured Aqua Container Security Platform, which is now available in GCP Marketplace, provides security across the application lifecycle, from development to production, and crucially secures those applications in runtime, leveraging native Kubernetes capabilities:

- Image Assurance Controls: Aqua can block unapproved images from running on Google Cloud Platform, at the individual node level, as well as across entire clusters, ensuring that only trusted, approved images will be able to run. Aqua's image drift prevention feature ensures that containers remain immutable and do not deviate from their originating image, further limiting the potential of abuse.

- Zero-Configuration Runtime Protection: Aqua automatically profiles container behavior to enforce least-privilege controls on running containers and pods, ensuring that they only perform actions that are required in the application context and alerting on or blocking specific actions that violate the policy.

- Network Controls: Aqua's container-level firewall enables enterprises to control network traffic based on Kubernetes namespaces, clusters or deployments. This allows admins to enforce network segmentation for compliance purposes, as well as limit an attack's "blast radius" across clusters and applications.

- CIS Kubernetes Benchmark: Building upon Aqua's open-source Kube-Bench, the tool widely used by the community to validate the security posture of Kubernetes deployments, Aqua incorporates CIS Kubernetes benchmark checks alongside updated Docker CIS benchmark checks. Automated checks can run daily, providing a detailed report that can also be exported for compliance.

- Audit Trail and Compliance: Aqua's granular event logging includes all container-related system events and policy violations to provide additional visibility for compliance and forensics.

"To remain competitive and deliver on user demands, organizations adopting cloud need ready access to trusted, tested and portable applications that can run across their entire infrastructure. At Google Cloud we strive to make it as easy as possible for customers of all sizes to deploy, purchase and manage leading solutions in the cloud," said Jennifer Lin, Director of Product Management Google Cloud. "The availability of commercial Kubernetes applications from providers like Aqua Security is a critical part of extending enterprise investments and can simplify adoption of container-based infrastructure no matter what environment they operate in, either on-premise or in the public cloud."

Availability and pricing: Aqua is available now on GCP Marketplace.

The Latest

August 16, 2018

There once was a time in software development where developers could design, build and then think about their software's security. However in today's highly connected, API-driven application environment, this approach is simply too risky as it exposes the software to vulnerabilities ...

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

August 02, 2018

Results from new Forrester Consulting research reveal the 20 most important Agile and DevOps quality metrics that separate DevOps/Agile experts from their less advanced peers ...

July 31, 2018

Even organizations that understand the importance of cybersecurity in theory often stumble when it comes to marrying security initiatives with their development and operations processes. Most businesses agree that everyone should be responsible for security, but this principle is not being upheld on a day-to-day basis in many organizations. That’s bad news for everyone. Here are some best practices for implementing SecOps ...

July 30, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps is a methodology that seeks to address this by operationalizing and hardening security throughout the software lifecycle ...

July 26, 2018

Organizations are shifting away from traditional, monolithic architectures, with three-quarters of survey respondents delivering at least some of their applications and more than one-third delivering most of their applications as microservices, according to the State of DevOps Observability Report from Scalyr ...

Share this