Tigera Introduces Calico Runtime Threat Defense
February 27, 2023

Tigera announced Calico Runtime Threat Defense.

Calico Runtime Threat Defense is the most comprehensive plug-and-play threat defense solution for network and container-based threats for applications on Kubernetes. By combining signature and behavior-based techniques to detect known and zero-day threats, Calico Runtime Threat Defense provides coverage for most common MITRE attack techniques for container and network-based attacks.

Calico Runtime Threat Defense for containers and Kubernetes continuously monitors and analyzes network and container behavior for Indicators of Attack (IOA) without the need for writing complex rules, freeing up valuable resources that would otherwise be spent on writing and maintaining security rules. Calico's global threat intelligence feed integrates with AlienVault and other threat intelligence providers to alert and block attacks from known malicious actors. This fully automated approach, which combines signature and behavior-based techniques to detect container and network-based attacks, is also more accurate and reliable than manual rule-based systems.

Calico's real-time alerts provide rich context for the potential threat along with suggested mitigation steps. These steps include policy recommendations, such as quarantining the infected pod, that are particularly useful for organizations that need more resources to independently interpret security data. Through clear and actionable guidance, Calico Runtime Threat Defense helps organizations respond to security threats in a timely and effective manner.

"The manual approach of legacy security tools was never a viable solution to the ballooning threats organizations face today," said Amit Gupta, Chief Product Officer at Tigera. "Calico Runtime Threat Defense brings the intelligence, automation, and continuous protection that security teams need to level the digital playing field and ensure a defensive posture that prevents breaches effectively and efficiently."

Calico Runtime Threat Defense uses two types of detection:

■ Behavior-based detection: alico Runtime Threat Defense uses eBPF to monitor container activity data across processes, file system activity, and system calls; the data is used by a wide range of pre-programmed detectors created by Tigera's Threat Research team to detect new zero-day threats. New detectors are continually added to stay on top of an ever-changing and dynamic threat landscape.

Calico Runtime Threat Defense also uses network traffic logs to baseline the behavior of cluster nodes, pods, and services and applies machine learning algorithms to determine indicators of port scans, IP sweeps and domain generation algorithms (DGA).

■ Signature-based detection:

- Intrusion detection and prevention – Calico's global threat intelligence feed integrates with AlienVault and other threat intelligence providers to protect from malicious IPs.

- Workload-centric WAF – Monitors HTTP communication to detect OWASP10 attacks.

- Malware detection – Maintains a database of malware file hashes as part of its threat intelligence library and actively blocks known malware.

- Honeypods – Deploys decoys or honeypods to monitor and detect suspicious activity within a Kubernetes cluster.

- Deep Packet Inspection (DPI) and threat detection with SNORT – Inspects network data in detail and performs signature-based detection of potential threats using SNORT rules.

Share this

Industry News

January 23, 2025

Progress announced the launch of Progress Data Cloud, a managed Data Platform as a Service designed to simplify enterprise data and artificial intelligence (AI) operations in the cloud.

January 23, 2025

Sonar announced the release of its latest Long-Term Active (LTA) version, SonarQube Server 2025 Release 1 (2025.1).

January 23, 2025

Idera announced the launch of Sembi, a multi-brand entity created to unify its premier software quality and security solutions under a single umbrella.

January 22, 2025

Postman announced the Postman AI Agent Builder, a suite empowering developers to quickly design, test, and deploy intelligent agents by combining LLMs, APIs, and workflows into a unified solution.

January 22, 2025

The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, announced the graduation of CubeFS.

January 21, 2025

BrowserStack and Bitrise announced a strategic partnership to revolutionize mobile app quality assurance.

January 21, 2025

Render raised $80M in Series C funding.

January 16, 2025

Mendix, a Siemens business, announced the general availability of Mendix 10.18.

January 16, 2025

Red Hat announced the general availability of Red Hat OpenShift Virtualization Engine, a new edition of Red Hat OpenShift that provides a dedicated way for organizations to access the proven virtualization functionality already available within Red Hat OpenShift.

January 16, 2025

Contrast Security announced the release of Application Vulnerability Monitoring (AVM), a new capability of Application Detection and Response (ADR).

January 15, 2025

Red Hat announced the general availability of Red Hat Connectivity Link, a hybrid multicloud application connectivity solution that provides a modern approach to connecting disparate applications and infrastructure.

January 15, 2025

Appfire announced 7pace Timetracker for Jira is live in the Atlassian Marketplace.

January 14, 2025

SmartBear announced the availability of SmartBear API Hub featuring HaloAI, an advanced AI-driven capability being introduced across SmartBear's product portfolio, and SmartBear Insight Hub.

January 14, 2025

Azul announced that the integrated risk management practices for its OpenJDK solutions fully support the stability, resilience and integrity requirements in meeting the European Union’s Digital Operational Resilience Act (DORA) provisions.

January 14, 2025

OpsVerse announced a significantly enhanced DevOps copilot, Aiden 2.0.