NEW! Dynamic Resource Balancer in Mirantis OpenStack for Kubernetes 24.2   |   Learn More


Securing Your Containers Isn’t Enough

The following is a guest post by Tim Reilly, CEO of Zettaset, a partner of Mirantis that provides first-of-its-kind, software only encryption solution that protects containers from data theft in any physical or virtual environment.
Containers have many use cases and benefits, but despite their impact, containers also create a host of new security challenges. Containers have short lifespans and move fast, so gaining full visibility into what’s happening in the environment can be difficult. Unlike virtual machines, containers aren’t always isolated from each other, so one compromised container can quickly lead to another. And if your data is compromised, it won’t matter that the container itself is secure.

When it comes to containers, the leading security concern continues to be the security of data that’s stored in them. Many organizations rely on access control, monitoring/logging, and existing workload security solutions to protect their container environments, but very few organizations have incorporated encryption because of the performance effect and complexity it often adds.

In a recent study, the extensive use of encryption, threat intelligence sharing, and integrating security into the DevOps process were all associated with lower than average data breach costs. Among those, encryption had the greatest impact – reducing breach costs by an average of $360,000. But encrypting data in containers is very different from encrypting data in other environments.

Join Zettaset & Mirantis on Wednesday, April 8th at 10am PDT for a deep dive into the issues surrounding protecting your container-based data and how to defend it against an ever-growing landscape of security threats and attackers.

In this webinar, our security experts, Maksim Yankovskiy, VP of Engineering at Zettaset and Bryan Langston, Cloud Solutions Architect at Mirantis, will discuss:
  • Aspects of a containers architecture that makes it more vulnerable to security threats
  • How encryption protects data at the heart of your applications
  • Overcome the hurdles of deploying encryption in containers while maintaining the benefits of DevOps environments
  • Best practices for implementing encryption in container environments
Watch Webinar Recording

Choose your cloud native journey.

Whatever your role, we’re here to help with open source tools and world-class support.



Cloud Native & Coffee

Subscribe to our bi-weekly newsletter for exclusive interviews, expert commentary, and thought leadership on topics shaping the cloud native world.