Request a Demo

You can still request to
join our Private Beta. * E-mail is mandatory.

Aqua Blog

Securing Container Workloads on AWS with Aqua

blog_AWS.png

Many of our customers run container workloads on AWS - hardly surprising given Amazon’s lead position in the cloud market. But AWS also offers some distinct advantages to those running containers,[…]

Docker Security Best Practices

Docker Security best practices

I recently attended a webinar in which one of the speakers said that a ‘container is never going to be as secure as a virtual machine’. I beg to differ. Docker containers are not inherently less[…]

Securing Containers on OpenShift

Red Hat OpenShift

Red Hat OpenShift container platform is one of the popular and mature platforms for developing and managing container deployments. While it has many built-in security features, Aqua provides an[…]

Security Best Practices for Kubernetes: Redux

K8S_blog.png

Last week I presented at the NY Kubernetes meetup on security best practices. 

Network Nano-Segmentation for Container Security in Aqua 2.0

blog-nano.png

Network segmentation is not a new concept in security. It’s been around for a while and is considered one of the most effective methods of limiting the “blast radius”, i.e., preventing extensive[…]