Request a Demo

You can still request to
join our Private Beta. * E-mail is mandatory.

Aqua Blog

How to Get Started with Containerization

This article was originally published in infoworld.com

As part of my job, I regularly meet with devops people to discuss their container strategy. Most of the time, the people I talk to are eager[…]

Keys, Tokens and Too Much Trust Found in Popular Container Images

This article was originally published in HelpNetSecurity.com

We are all aware of the risks introduced by good old third party code. Where would we be without it? Apparently not very far: It is[…]

Announcing Aqua CSP 2.5: Multi-Tenant Security Management for Containers

We’re glad to announce version 2.5 of the Aqua Container Security Platform, which includes hundreds of improvements and new features. Our main focus has been on making the platform more scalable[…]

Docker Security Best Practices 2017

I recently attended a webinar in which one of the speakers said that a ‘container is never going to be as secure as a virtual machine’. I beg to differ. Docker containers are not inherently less[…]

Securing Container Deployments on Bluemix with Aqua Security

The security of enterprise software has never been more important. As more and more enterprises move to container-based deployments in the public or hybrid cloud, there are increasing numbers of[…]

Achieving HIPAA Compliance for Containers: Impact Analysis and Best Practices

Since 1996, the HIPAA act has mandated how personal health information (PHI) should be secured and protected from prying eyes. HIPAA requirements changed how companies in the healthcare industry[…]

CIS Benchmark for Kubernetes 1.6

The Center for Internet Security (CIS) published a new banchmark last week for Kubernetes 1.6. As the adoption of container technologies grows rapidly, orchestrators have become a key enabler,[…]

Top 5 Aqua Blogs!

We wrote them and you loved them. Here’s a recap of the posts you shared, engaged, tweeted, liked, repurposed and gave us feedback on the most. So if you’ve been searching for updates about the[…]

Finally Delivering on Bill Gates’s Trustworthy Computing

[ Upesh recently joined the Aqua team as our VP of Business Development. Upesh has an amazing track record in the cybersecurity space in getting innovative start-ups embedded with major IT vendors[…]

Securing Containers on OpenShift

Red Hat OpenShift container platform is one of the popular and mature platforms for developing and managing container deployments. While it has many built-in security features, Aqua provides an[…]