NeuVector Extends Support for Red Hat OpenShift
May 10, 2018

NeuVector announced an expansion to its support for Red Hat OpenShift Container Platform by adding availability for role-based access controls (RBACs).

The new capability can instantly enable developers, architects, DevOps personnel, and security teams to achieve more complete security visibility and management for Red Hat OpenShift-deployed containers. Enterprises can now deploy Red Hat OpenShift Container Platform with added confidence knowing that the same access controls created for Red Hat OpenShift Container Platform can also be applied to the management of the NeuVector multi-vector firewall. NeuVector is among the first Red Hat Certified firewall containers available for Red Hat OpenShift Container Platform and it is listed in the Red Hat Container Catalog.

NeuVector provides a highly integrated and automated security solution for safeguarding Kubernetes environments against container threats, violations, and vulnerabilities throughout the entire application lifecycle — including protections against sophisticated insider attacks. Proper controls for limiting access to Red Hat OpenShift and NeuVector resources are a critical requirement for preventing insiders with bad intentions from executing unauthorized operations. With this extension of its capabilities for Red Hat OpenShift, NeuVector now fully utilizes Red Hat OpenShift RBACs to help defend container tools from insider threats.

Additionally, the NeuVector capabilities now enable Red Hat Container Registry images to be easily scanned for vulnerabilities using NeuVector's container security solution. With this new capability, enterprises can have automated image scanning integrated into their CI/CD processes from day one.

NeuVector is also making a Jenkins plugin available that introduces automated scanning in the image build process. Customers using Jenkins in their integration and build processes can set policies for allowing or failing builds based on whether vulnerabilities are detected in the images. The automated registry and image build-time scanning is designed to ensure that known vulnerabilities are not introduced into the application development and deployment lifecycle. The NeuVector multi-vector container firewall is designed to further protect Red Hat OpenShift containers during run-time, guarding against zero-day attacks and even exploits of yet unknown vulnerabilities.

The Latest

May 22, 2018

DEVOPSdigest asked experts from across the IT industry for their opinions on the top tools to support DevSecOps. Part 2 covers DevOps and development ...

May 21, 2018

While DevSecOps, much like DevOps itself, is more about changing IT culture than employing certain types of technology, some tools can be an important support. To find out what the right tools are, APMdigest asked experts from across the IT industry for their opinions on the top tools to support DevSecOps. Part 1 covers the testing phase ...

May 17, 2018

The top two business priorities for CIOs of midsize enterprises (MSEs) in 2018 are growth and digital transformation. However, 57 per cent of MSEs are not yet delivering digital initiatives, according to findings from Gartner Inc.'s 2018 CIO Agenda Survey ...

May 15, 2018

Almost every company is facing the challenge of digital transformation today. This means rethinking and retooling your company to compete and succeed in an increasingly digital world. While digital transformation is not only about technology, the right tools can help. To find out what these right tools are, APMdigest asked experts from across the IT industry for their opinions on the essential tools to support digital transformation ...

May 08, 2018

With data breaches consistently being in the news over the last several years, it is no wonder why data privacy has become such a hot topic and why the European Union (EU) has put in place General Data Protection Regulation (GDPR) which will become enforceable on May 25, 2018, which is less than a month away ...

May 03, 2018

The prospect of increased workloads, combined with shrinking mainframe skillsets, has huge implications for mainframe DevOps. The only way for organizations to solve this skills gap crisis is by optimizing developer productivity. Drilling down a level further, what does this all mean for mainframe DevOps? ...

May 02, 2018

When it comes to operations and development, DevOps has changed the traditional compartmentalized style of development by eliminating silos. But what about the security team? Security is largely still siloed from operations and development. No doubt, many DevOps teams have some security controls baked into their automation processes, but a recent survey shows there are still alarming gaps ...

April 30, 2018

According to the 2018 Global Security Trends in the Cloud report, 93 percent of respondents faced challenges when deploying their current on-premises security tools in the cloud, and 97 percent lacked the tools, cross-functional collaboration and resources to gain proper insight into security across the organization. These numbers indicate a big problem in DevSecOps that needs to be addressed ...

April 26, 2018

Moving more workloads to the cloud is a top IT priority, so eventually it will be time to consider how to make those critical legacy applications cloud ready. In Part 1 of this blog, I outlined the first four of eight steps to chart your cloud journey. In addition, consider the next four steps below ...

April 25, 2018

Clearly, moving applications to the cloud delivers significant advantages. So what's standing in the way of full cloud adoption? For many companies it's those burdensome (but critically important) legacy applications. Moving more workloads to the cloud is a top IT priority. So, eventually it will be time to consider how to make those critical legacy applications cloud ready. Consider the following eight steps to chart your cloud journey ...

Share this