Aqua Blog

Secure VM

Automate Cloud VM Compliance with Cloud Provider Tags and Labels

Automate Cloud VM Compliance with Cloud Provider Tags and Labels

Ensuring and monitoring compliance and security best practices policies at runtime can often be a barrier to both broader adoption of cloud native technologies and moving more cloud native applications into production at scale. Cloud provider attributes — tags, labels, and resource groups — are useful tools for …

Continue reading ›
Protecting Cloud VMs for Full-Stack Cloud Native Security

Protecting Cloud VMs for Full-Stack Cloud Native Security

The management of Virtual Machines (VMs) in the cloud is not like anything else in your cloud native environment. Traditional host-based security methods used for VMs running on physical servers relied on agents to perform functions that simply do not exist in cloud native environments. In addition, cloud instances …

Continue reading ›
Cloud VM Security with Aqua CSP

Cloud VM Security with Aqua CSP

We have enhanced our Cloud Native Security Platform (CSP) by adding Cloud VM protection capabilities for VMs that are not running container workloads. Aqua now provides a full-stack security solution across all workload types: VMs, containers, and serverless functions, for both Linux and Windows VMs.

Continue reading ›
Secure Apps Across VMs and Containers with Aqua and VMware AppDefense

Secure Apps Across VMs and Containers with Aqua and VMware AppDefense

Best-of-Breed Security for Hybrid Environments

Today we announced a new partnership with VMware, based on their AppDefense solution. The combined offering provides a least-privilege security solution for applications running across containers and VMs. VMware, known of course for its virtualization technology, has deep …

Continue reading ›
Aqua Integration with VMWare for Hybrid VM and Container Security

Aqua Integration with VMWare for Hybrid VM and Container Security

Last month at VMWorld we had the pleasure of being part of a next-generation security session given by VMWare’s SVP of Security Products, Tom Corn. 

Continue reading ›
The Race for Security: Can VMs and Containers Really Compete?

The Race for Security: Can VMs and Containers Really Compete?

Although they have vastly different architectures, virtual machines (VMs) and containers both reliably run software when moved from one computing environment to another. Some have claimed containers will overtake the use of VMs, but until containers evolve to a level of sophistication and maturity that strongly …

Continue reading ›