Securing the existing Enterprise network between Virtual Machines and Containers with Aporeto(23 Oct 2019)
While organizations refactor their applications and containerize new components, not all components of the application may make it into the container platform. These new components often need to connect to other non-containerized systems (such as databases) and require the same (or higher) security controls and network visibility. This blog identifies how to layer the zero-trust network solution provided by Aporeto on top of existing Enterprise networks and adding additional security layers without replacing existing infrastructure or processes.
Simple by design; Automating per-namespace isolation with Aporeto and OpenShift(14 Aug 2019)
A zero trust network security policy has the capability to describe network communication at a very fine level of detail, which will also drastically increase the quantity of policy information generated. Managing and maintaining that level of detail can quickly become overwhelming. Aporeto's grouping and labeling of objects, as well as its ability to leverage OpenShift labels as grouping identifiers, allows policies that can encompass a fine level of detail and still be human readable.