Home > Blog > Securing Your Containers Isn’t Enough

Securing Your Containers Isn’t Enough

Tim Reilly - April 6, 2020 - | | |

The following is a guest post by Tim Reilly, CEO of Zettaset, a partner of Mirantis that provides first-of-its-kind, software only encryption solution that protects containers from data theft in any physical or virtual environment.

Containers have many use cases and benefits, but despite their impact, containers also create a host of new security challenges. Containers have short lifespans and move fast, so gaining full visibility into what’s happening in the environment can be difficult. Unlike virtual machines, containers aren’t always isolated from each other, so one compromised container can quickly lead to another. And if your data is compromised, it won’t matter that the container itself is secure.

When it comes to containers, the leading security concern continues to be the security of data that’s stored in them. Many organizations rely on access control, monitoring/logging, and existing workload security solutions to protect their container environments, but very few organizations have incorporated encryption because of the performance effect and complexity it often adds.

In a recent study, the extensive use of encryption, threat intelligence sharing, and integrating security into the DevOps process were all associated with lower than average data breach costs. Among those, encryption had the greatest impact – reducing breach costs by an average of $360,000. But encrypting data in containers is very different from encrypting data in other environments.

Join Zettaset & Mirantis on Wednesday, April 8th at 10am PDT for a deep dive into the issues surrounding protecting your container-based data and how to defend it against an ever-growing landscape of security threats and attackers.

In this webinar, our security experts, Maksim Yankovskiy, VP of Engineering at Zettaset and Bryan Langston, Cloud Solutions Architect at Mirantis, will discuss:

  • Aspects of a containers architecture that makes it more vulnerable to security threats
  • How encryption protects data at the heart of your applications
  • Overcome the hurdles of deploying encryption in containers while maintaining the benefits of DevOps environments
  • Best practices for implementing encryption in container environments

Watch Webinar Recording

Learn more about container security solutions from Mirantis.

Subscribe to Mirantis Newsletter

Get blogs and other content delivered straight to your inbox.

FREE EBOOK!
Service Mesh for Mere Mortals
by Bruce Basil Mathews
DOWNLOAD
LIVE WEBINAR
Docker Swarm is Dead! Long Live Docker Swarm

Thursday, October 28 at 10:00am PDT
SAVE SEAT
LIVE WEBINAR
You've Got Kubernetes. Now You Need App-Focused Security Using Istio

Presented with Aspen Mesh
SAVE SEAT
LIVE WEBINAR
Defining a Kubernetes that just works, anywhere

Thursday, November 11 at 8:00am PST
SAVE SEAT
Mirantis Webstore
Purchase Kubernetes support
SHOP NOW
WHITEPAPER
The Definitive Guide to Container Platforms
READ IT NOW

Subscribe to Mirantis Newsletter

Get blogs and other content delivered straight to your inbox.

FREE EBOOK!
Service Mesh for Mere Mortals
by Bruce Basil Mathews
DOWNLOAD
LIVE WEBINAR
Docker Swarm is Dead! Long Live Docker Swarm

Thursday, October 28 at 10:00am PDT
SAVE SEAT
LIVE WEBINAR
You've Got Kubernetes. Now You Need App-Focused Security Using Istio

Presented with Aspen Mesh
SAVE SEAT
LIVE WEBINAR
Defining a Kubernetes that just works, anywhere

Thursday, November 11 at 8:00am PST
SAVE SEAT
Mirantis Webstore
Purchase Kubernetes support
SHOP NOW
WHITEPAPER
The Definitive Guide to Container Platforms
READ IT NOW