Containers, security, and compliance in the financial sector: putting it all together

Since day one at StackRox, three years ago, we’ve made it a point to meet regularly with CISOs from top banks and other global 2000 companies. The focus of these discussions was on how we might expedite the adoption of containers, and improve the process of maintaining better security and regulatory compliance. Over the course of these many conversations, I’ve found that there are some important ideas worth sharing broadly, though they’re likely most interesting to IT and security leaders in the financial world, where both competitive and regulatory pressures are very high.

Image - Announcing our partnership with Google

Announcing our partnership with Google

Today we are excited to announce a new partnership with Google Cloud Platform (GCP) to jointly deliver end-to-end security across the cloud-native stack for any enterprise. Together, StackRox and Google will accelerate customers’ adoption of secure, containerized application architectures. No company knows more about containers than Google. They have run containers in production for over a decade, and pioneered an ambitious new approach to enterprise computing at scale. Google originated Kubernetes and continues to be its largest contributor in every release, even after more than 58,000 commits.

Image - AWS re:Invent 2017 Recap: Kubernetes, Security, and Microservices

AWS re:Invent 2017 Recap: Kubernetes, Security, and Microservices

Last week marked another milestone for the public cloud. I had the opportunity to attend Amazon Web Services (AWS) re:Invent, along with more than 43,000 other attendees who descended on Las Vegas to hear how organizations are using the cloud, learn from more than 1,300 technical sessions, and catch a highly anticipated lineup of product announcements from AWS (an exhaustive list can be found here). AWS re:Invent registration area AWS re:Invent record attendance

Image - Securing containers on any infrastructure with StackRox & Docker Enterprise Edition

Securing containers on any infrastructure with StackRox & Docker Enterprise Edition

Four and a half years since it was first introduced, Docker continues to have a profound impact on reshaping how developers build, ship, and run software applications. Few could have anticipated the speed of Docker adoption that we have observed to date with more than 21 million hosts now running Docker, over 24 billion Docker container downloads, and a vibrant ecosystem of 100,000+ third-party projects that incorporate Docker. As the de facto standard for the container runtime and image format, Docker has democratized the ability for anyone to take advantage of container technologies that could previously only be utilized by a handful of the world’s largest, cloud-native companies.

Image - Video demo of StackRox machine learning capabilities

Video demo of StackRox machine learning capabilities

In the seventh video in our demo series, we’ll take a look at StackRox machine learning capabilities. StackRox uses five simultaneous machine learning models to continuously capture and analyze millions of signals from your container and microservices environments, delivering insight and intelligence. You can use these powerful models – snapshot them, import and export them – in your distributed environments for good security hygiene and baselining for effective threat detection.

Image - Fueling digital transformation in the public sector with OpenShift & container security

Fueling digital transformation in the public sector with OpenShift & container security

On November 9, 2017, I attended the 9th annualRed Hat Government Symposium in Washington, DC, and quickly got a sense of Red Hat’s momentum in the public sector and the rapid growth of OpenShift, Red Hat’s container application platform based on Kubernetes. Over 600 participants attended the symposium, many of whom were senior IT and cybersecurity leaders from government agencies such as Department of Homeland Security (DHS), Federal Emergency Management Agency (FEMA), General Services Administration (GSA), Social Security Administration (SSA), U.

Image - Video demo of StackRox enforcement features

Video demo of StackRox enforcement features

In this sixth video in our demo series, I provide an overview of our StackRox enforcement features. Learn about native StackRox profiles that allow you to prevent and disrupt violations and attacks in your development or production environment. Then, I’ll show you how you can create your own customized enforcement profiles.

Image - Pairing StackRox with Google Kubernetes Engine for runtime security

Pairing StackRox with Google Kubernetes Engine for runtime security

In the three and a half years since its release, Kubernetes has become one of the most popular container management systems on the market. A survey by 451 Research found that 71% of enterprise organizations running containers are using Kubernetes. Likewise, Google Kubernetes Engine (GKE) has emerged as one of the leading managed services for Kubernetes deployments, attracting customers like Niantic, Philips, Meetup, and Evernote. GKE extends the baseline benefits of Kubernetes, including automated cluster deployment, managed container networking, autoscaling, and a managed master node with guaranteed uptime and automated Kubernetes upgrades.

Image - Policy management

Policy management

Here is our fifth video in our demo series of our StackRox platform. In this demo, see how you can manage policies for your highly distributed and/or container environments. You can use our preloaded policies, or create new policies, helping you use StackRox to automatically detect attacks, building better security hygiene into your infrastructure in development and production.

Image - Machine learning and security: setting the record straight

Machine learning and security: setting the record straight

Machine learning (ML) can be a powerful tool for augmenting the detection efficacy of a cybersecurity solution. Using it effectively means first cutting through the hype and understanding the tangible steps needed to build models with it. The vast majority of enterprise security solutions – from antivirus applications to firewalls to intrusion detection and prevention systems – use (or at least claim to use) ML to detect threats that traditional approaches can’t, in many cases because such threats unfold faster or on a much larger scale than a traditional security solution can process.

Image - Video demo of threat hunting

Video demo of threat hunting

In this fourth video of our demo series, I show how our solution gives responders the capabilities to hunt for threats in their environments by looking for malicious indicators. In this video, see how StackRox tracks suspicious events over time and surfaces them if they are used in malicious activity.