NEW! Mirantis Academy -   Learn confidently with expert guidance and On-demand content.   Learn More

Integrated Container Security Solutions Throughout the
Application Lifecycle

Give your applications greater protection without sacrificing performance or adding extra cost.

With Mirantis Container Cloud and Mirantis Kubernetes Engine, you get integrated security tools for delivering safer applications and improving policy automation without sacrificing performance. Leveraging security features built into Mirantis Container Runtime and Mirantis Secure Registry, Mirantis Kubernetes Engine adds an extra layer of threat protection that travels with your applications in a secure supply chain solution.

mcc-on-monitor-2x
DATASHEET

Learn more about Mirantis Kubernetes Engine

Mirantis Kubernetes Engine is the fastest way to securely build, share and run modern applications anywhere. Download the datasheet to learn more.

DOWNLOAD NOW
DATASHEET

Learn more about Mirantis Kubernetes Engine

Mirantis Kubernetes Engine is the fastest way to securely build, share and run modern applications anywhere. Download the datasheet to learn more.

DOWNLOAD NOW

VIDEO: Everything You Need To Know About Mirantis Secure Registry

Automated Governance

Mirantis Kubernetes Engine oversees your containerized applications at scale, interweaving best practices and flexible governance rules with your existing policies. For example, container image security is enhanced as your container images automatically go in and out of checkpoints based upon policy-driven rule sets that provide monitoring and vulnerability detection, and determine how content progresses through Mirantis Secure Registries from development into production securely.

Container security solutions provide granular & flexible role-based access controls (RBAC) enable your teams to work quickly, efficiently and seamlessly as a repeatable business process, sparking creativity and innovation while reducing risk. RBAC that allows diverse teams at your company to work within the same operational environment while limiting what actions specific groups can take.

Secure application zones enable multi-tenancy within individual clusters. That allows your organization to maximize the utilization of your compute resources by providing for numerous applications to be managed within the same cluster while still providing container isolation security.

Société Générale accelerates their cloud native journey with Mirantis

Global financial services group exceeds cloud native objectives

2020 goal for running pods: 15,000

Today: Over 33,000 across 1,000 nodes

Migration from monolith to Swarm to Kubernetes

Mirantis architecture supports Société Générale’s optimizations saving up to: 30% on compute resources

Secure Content Across the Software Supply Chain

Mirantis Kubernetes Engine offers cryptographic digital signing to confirm container image provenance and authenticity – in effect providing your operations team with details about the author of an application and confirming that it hasn’t been tampered with or modified in any way to improve the security of containers running on your cluster.

Image signing and vulnerability scanning allow your operations teams to have visibility into your container; who is the author, what is the bill of materials of the container image and whether there are critical vulnerabilities to understand and address.

Policy-based image promotion and image pruning accelerates the DevOps pipeline, allowing you to act on images that pass security scans by promoting them automatically, or removing them if they’re no longer needed.


mirantis-secure-registry-diagram mirantis-secure-registry-diagram
secure-platform-diagram secure-platform-diagram

Secure Platform

Mirantis Kubernetes Engine provides default configurations that offer greater protection for applications running on top of Mirantis Container Runtime and across both Swarm and Kubernetes orchestration technologies. The platform establishes strong secure defaults, while still leaving the controls with the admin to change configurations and policies as needed.

Out-of-the-box security defaults include:

System-level mutual TLS authentication and cryptographic node identity ensure that communications stay inside the cluster, and foreign nodes stay outside, preventing data leakage and attacks.

Application-level isolation with authentication/ authorization lets you share resources without sacrificing security because you must explicitly open network communications to an application for any application or person to see or access it.

Container security solutions provide FIPS 140-2 validated cryptographic modules that ensure that Mirantis Container Runtime meets the standards required by the US Federal government and other regulated industries by delivering on the fundamental confidentiality, integrity and availability objectives of information security. Besides container runtime security, the Mirantis Cloud Native Platform product suite features DISA STIG validation for Mirantis Kubernetes Engine, making it easier for customers to pass compliance audits and ensure secure operations.

mirantis-opscare-plus-icon-medium mirantis-opscare-plus-icon-medium

OpsCare Plus: Guaranteed Outcomes

clock-icon-medium clock-icon-medium

Deploy environment &
applications in hours - not days

checklist-icon-medium checklist-icon-medium

Deploy against Mirantis
validated best practices

turning-gears-icon-medium turning-gears-icon-medium

Always current releases ensure
stability, security & uptime