Avatar photo
By: Kevin Ayres

November 11, 2024 6:51 pm

363 views

Send SUSE Security (NeuVector) events to AWS CloudTrail Lake

Guest writer: Dominik Wombacher, Sr. Partner Solutions Architect, AWS In this Blog, you'll learn how to send SUSE Security (NeuVector) events and reports to AWS CloudTrail Lake . Storing alert data immutably and securely for years is a common use-case. This helps to fulfill audit and compliance requirements and allows access to the ingested data at […]

Read More


Avatar photo
By: Ivan Tarin

October 29, 2024 6:27 pm

376 views

Strengthening Cloud Native Security: A Deep Dive Into Container Runtime Protection

As organizations shift towards cloud native architectures, containers have become the backbone of agile application deployment and resource management. However, the shift has introduced new security challenges, particularly in the runtime phase (when containers execute their operations).  The container runtime phase is arguably the most vulnerable stage of a container’s lifecycle, where the […]

Read More


Avatar photo
By: Ivan Tarin

October 21, 2024 9:25 pm

372 views

Scaling Enterprise Applications With Advanced Container Management Techniques

Containerized applications are challenging just to maintain and keep healthy. Container orchestration, continuous deployment and constant backup can take a toll on your memory and storage capacity and cause network latency. Or simple container misconfigurations can lead to severe loss of memory or storage. Then, as those same apps are scaled to tens of thousands […]

Read More


Avatar photo
By: Ivan Tarin

October 17, 2024 6:22 pm

339 views

Take a Unified Approach to Zero Trust and Network Visibility in Cloud Native Environments

The potential advantages of cloud native applications and environments include the ability to scale massively and increase deployment speeds from multiple times a year to multiple times a day. However, those same benefits also create new considerations for security: how do you keep thousands or hundreds of thousands of apps or services secure? Take autoscaling […]

Read More


Avatar photo
By: Ivan Tarin

August 26, 2024 1:16 pm

1,546 views

Introducing NeuVector Prime 5.4: Elevating Container Security Within the Rancher Prime Platform

Security remains a core building block for any organization’s container strategy, and today, I’m excited to announce the release of NeuVector Prime 5.4 is now expected in September, now fully integrated as a vital component of the Rancher Prime platform. This release brings key enhancements that not only fortify your cloud native […]

Read More


Avatar photo
By: Peter Smails

June 14, 2023 8:42 pm

6,747 views

Navigating the Ever-Evolving Landscape of Cybersecurity Threats

In daily interactions with tech leaders, the term Digital Trust almost always comes up.  Organizations want to ensure that their customers feel safe interacting with them digitally, that their data is secure and that the systems they interact with are reliable. It's apparent that building a Digital Trust relationship is a vital objective for […]

Read More


Avatar photo
By: Raul Mahiques

May 22, 2023 1:33 pm

5,710 views

Container Security – How to Quickly Install NeuVector 5 on OpenShift 4

NeuVector is a container security platform that provides comprehensive security for containerized applications allowing you to not only prevent attacks but also to actively protect your applications from unknown vulnerabilities by implementing behavioral-based Zero-Trust security policies. In this blog post, we will walk through the steps of installing NeuVector on OpenShift 4 using the NeuVector […]

Read More


Avatar photo
By: Glen Kosaka

February 1, 2023 12:54 pm

3,844 views

Container Security: Zero Trust Runtime Security

Protect data in production   Traditional security practices focus on exceptions, blocklists, signatures, malware, and vulnerability scanning. These legacy approaches, while important to a layered security approach, focus efforts on being reactive which is becoming harder to scale. Zero-Trust is critical in moving to a proactive approach to security, where we can declare acceptable behavior […]

Read More


Avatar photo
By: Glen Kosaka

February 1, 2023 12:53 pm

4,023 views

Kubernetes Security: Vulnerability Management 

Profile Risk with Vulnerability Management Throughout the Build, Ship, and Run Pipeline NeuVector scans for vulnerabilities during the entire continuous integration/continuous delivery (CI/CD) pipeline, from Build to Ship to Run. Use the Jenkins plug-in to scan during build, monitor images in registries and run automated tests for security compliance. Prevent deployment of vulnerable images with […]

Read More