Request a Demo

You can still request to
join our Private Beta. * E-mail is mandatory.

Aqua Blog

Achieving HIPAA Compliance for Containers: Impact Analysis and Best Practices

Since 1996, the HIPAA act has mandated how personal health information (PHI) should be secured and protected from prying eyes. HIPAA requirements changed how companies in the healthcare industry[…]

Top 5 Aqua Blogs!

We wrote them and you loved them. Here’s a recap of the posts you shared, engaged, tweeted, liked, repurposed and gave us feedback on the most. So if you’ve been searching for updates about the[…]

Finally Delivering on Bill Gates’s Trustworthy Computing

[ Upesh recently joined the Aqua team as our VP of Business Development. Upesh has an amazing track record in the cybersecurity space in getting innovative start-ups embedded with major IT vendors[…]

Securing Containers on OpenShift

Red Hat OpenShift container platform is one of the popular and mature platforms for developing and managing container deployments. While it has many built-in security features, Aqua provides an[…]

Container Security Automation: Keeping Up With The DevOps Crowd

This article was originally published in InfoWorld.com, New Tech Forum

From development to deployment, one of the most distinctive traits of using containers is speed. The development cycle is[…]

RSAC 2017 Presentation Video: Containers - The Dr. Jekyll and Mr. Hyde of Security

At the RSA conference last February, our very own Tsvi Korren packed a room full of more than 400 security pros who came to get the lowdown on container security. This session is now available[…]

Managing Secrets in Docker Containers

In our many conversations with customers, secrets management has come up as a particularly thorny issue that seemed to lack an elegant, cross-platform solution for container environments. Not a[…]

Assembling a Container Security Program

As excitement around container technology continues to grow, many questions remain regarding the best way to secure them from both a technical and organizational perspective. While developers and[…]

10 Key Security Terms DevOps Need to Know

It’s no secret that DevOps and IT security, like oil and water, are hard to mix. After all, DevOps is all about going fast, while security is all about proceeding carefully. However, both DevOps […]

The Year That Was (Almost) - 10 Milestones in The Container Ecosystem

2016 was a big year for the virtual container space, and 2017 looks even more promising. The industry saw tremendous growth and continues to evolve at a rapid pace. Containers, being still[…]