Request a Demo

You can still request to
join our Private Beta. * E-mail is mandatory.

Aqua Blog

Do Containers Provide Better Protection Against Meltdown and Spectre?

meltdown_bg.png

About Meltdown and Spectre

Following the trend of ‘branding’ vulnerabilities, Meltdown and Spectre vulnerabilities (CVE-2017-5754, CVE-2017-5753, and CVE-2017-5715) are ‘brand’ names given to[…]

Keys, Tokens and Too Much Trust Found in Popular Container Images

Container secrets (2).png

This article was originally published in HelpNetSecurity.com

We are all aware of the risks introduced by good old third party code. Where would we be without it? Apparently not very far: It is[…]

Announcing Aqua CSP 2.5: Multi-Tenant Security Management for Containers

Multi Tenancy

We’re glad to announce version 2.5 of the Aqua Container Security Platform, which includes hundreds of improvements and new features. Our main focus has been on making the platform more scalable[…]

Achieving HIPAA Compliance for Containers: Impact Analysis and Best Practices

hipaa compliance for containers.png

Since 1996, the HIPAA act has mandated how personal health information (PHI) should be secured and protected from prying eyes. HIPAA requirements changed how companies in the healthcare industry[…]

Top 5 Aqua Blogs!

Top Aqua Security blogs.png

We wrote them and you loved them. Here’s a recap of the posts you shared, engaged, tweeted, liked, repurposed and gave us feedback on the most. So if you’ve been searching for updates about the[…]

Finally Delivering on Bill Gates’s Trustworthy Computing

delivering trustworthy computing.png

[ Upesh recently joined the Aqua team as our VP of Business Development. Upesh has an amazing track record in the cybersecurity space in getting innovative start-ups embedded with major IT vendors[…]

Securing Containers on OpenShift

Red Hat OpenShift

Red Hat OpenShift container platform is one of the popular and mature platforms for developing and managing container deployments. While it has many built-in security features, Aqua provides an[…]

Container Security Automation: Keeping Up With The DevOps Crowd

Container Security Automation

This article was originally published in InfoWorld.com, New Tech Forum

From development to deployment, one of the most distinctive traits of using containers is speed. The development cycle is[…]

RSAC 2017 Presentation Video: Containers - The Dr. Jekyll and Mr. Hyde of Security

RSAC 2017 container security

At the RSA conference last February, our very own Tsvi Korren packed a room full of more than 400 security pros who came to get the lowdown on container security. This session is now available[…]

Managing Secrets in Docker Containers

blog-secrets-2.png

In our many conversations with customers, secrets management has come up as a particularly thorny issue that seemed to lack an elegant, cross-platform solution for container environments. Not a[…]