Request a Demo

You can still request to
join our Private Beta. * E-mail is mandatory.

Aqua Blog

Aqua 3.0: Kubernetes Security Deep-Dive

Kubernetes native security solution aqua

Since the second half of 2017, Kubernetes has been gaining momentum in adoption as well as in its ecosystem support. We see more and more enterprises choosing Kubernetes for the orchestration of[…]

Revisiting AWS Fargate with Aqua 3.0

AWS Fargate CaaS microenforcer

A few months ago I was lucky enough to get my hands on Fargate when it was in preview in the run-up to AWS re:invent. It was immediately clear that it’s a pretty cool concept, and that it presents[…]

Securing Container Workloads on AWS with Aqua

blog_AWS.png

Many of our customers run container workloads on AWS - hardly surprising given Amazon’s lead position in the cloud market. But AWS also offers some distinct advantages to those running containers,[…]

Docker Security Best Practices

Docker Security best practices

I recently attended a webinar in which one of the speakers said that a ‘container is never going to be as secure as a virtual machine’. I beg to differ. Docker containers are not inherently less[…]

Securing Containers on OpenShift

Red Hat OpenShift

Red Hat OpenShift container platform is one of the popular and mature platforms for developing and managing container deployments. While it has many built-in security features, Aqua provides an[…]

Security Best Practices for Kubernetes: Redux

K8S_blog.png

Last week I presented at the NY Kubernetes meetup on security best practices. 

Network Nano-Segmentation for Container Security in Aqua 2.0

blog-nano.png

Network segmentation is not a new concept in security. It’s been around for a while and is considered one of the most effective methods of limiting the “blast radius”, i.e., preventing extensive[…]