A large enterprise industrial conglomerate company experienced significant improvements in efficiency, reliability and overall satisfaction, highlighting the transformative impact of NeuVector on Amazon EKS.
At-a-Glance
The feedback provided in this spotlight was collected and verified through a survey conducted by UserEvidence, an independent research firm, on SUSE's customers.
The Challenge
The company had security concerns with its Kubernetes environment and had to meet corporate security and audibility policies. To keep its environment secure and avoid breaches and phishing, it wanted a full lifecycle container security solution and preferred a Zero Trust approach rather than a traditional security approach. This organization is using cloud native tools for developer agility and needed to secure both these environments and an air-gapped environment. Finally, the company needed better visibility into its clusters.
"Having NeuVector secure our Amazon EKS clusters has allowed us to fully view vulnerabilities."
SUSE Solution
Without NeuVector on Amazon EKS, this organization would not have been able to adopt a fully cloud native strategy. Not only would it fail its compliance reviews, its systems would have been impacted by zero day attacks, leaving the company vulnerable to unplanned downtime, data breaches and/or bribery attacks. In addition, the organization would have zero visibility into cluster communications and no software to create an application communication map. Finally, it would lack the ability to capture East-West packets for inspection.
The Results
This company now has automated policy creation with behavioral learning and adaptive enforcement to enable auto-scaling. They also are able to maintain a layer 7 container firewall that protects east-west and ingress/egress traffic.
In addition, this customer now has run-time vulnerability scanning for any container or host in the Kubernetes cluster, plus compliance and auditing through CIS security benchmarks, and a multi-vector container security addressing the network, container and host.