×
ItalianoEnglish
Set as default language

Grandangolo Communications

  • Home
  • Company
  • Services
    • Public Relation
    • Digital PR
    • Marketing
    • Lead Generation
    • Events
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages
  • Home
  • Customer Press Room
  • Qualys
  • Qualys adds runtime protection and automation to its Container Security solution

Customer Press Room

Qualys adds runtime protection and automation to its Container Security solution

by Grandangolo Communications / Thursday, 12 November 2020 / Published in Qualys

The new solution ensures complete visibility and protection of applications running in all container-based environments. even in as-a-service mode

Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of highly innovative cloud-based IT security and compliance solutions, unveiled Container Runtime Security, a feature that ensures execution-level defense capabilities for containerized applications.

This revolutionary approach uses a small portion of Qualys code in the container image, allowing you to check its status and block unwanted behavior. This functionality eliminates the need for premium containers or sidecars, which are complex to manage and cannot function in an as-a-service environment.

Once activated, the solution will work in any environment without requiring additional elements. This allows to address in real time typical cases of Container secutity such as, for example, file access control, network micro segmentations, vulnerability and exploit mitigation and virtual patching.

“At Zoom, we continue to improve our global security program that begins with prevention, detection and responsiveness for all workloads,” he says. Randolph Barr, Head of Security Operations on Zoom". Applying security best practices, mitigating attacks and managing monitoring are important for container runtime security. Qualys Container Runtime Security will become an indispensable tool for extending detection and response capabilities to workloads running on any container infrastructure ”.

Today it is possible to develop a complete container security program, adopting a single solution that includes vulnerability management, detection and response through an ongoing process that covers all stages of the development cycle.

With Qualys Container Runtime Security, customers can:

  • Carefully check the behavior of running containers, being able to decide what to check and block, for example, in relation to access to files, network communications and the behavior of individual processes.
  • Create granular and customized policies, or use the integrated library rather than setting a policy based on the behaviors observed by the system
  • Equip container images in the CI / CD development pipeline with an innovative "follow the image" approach that enables standardized and guaranteed security of containers running in any environment (Docker, Kubernetes, AWS EKS / ECS, Azure AKS, Google GKE ), including those without servers such as Azure Container Instances, AWS Fargate, and Google CloudRun.

“The growth of Kubernetes comes at a time when we are able to solve many of the problems of the IT infrastructure and software development. However, new tools are needed to secure containers, as developing container-based applications requires a completely different approach to software, "he said. Frank Dickson, Program Vice President Security Products di IDC. "Kubernetes can be managed as an immutable infrastructure, however, the reality is that container configurations can deviate during execution. Qualys' approach allows security to monitor the container image with integrated instrumentation, enabling visibility and rule enforcement to running containers. This strategy facilitates the "follow the container" approach, providing DevOps and development managers with future-proof protection as applications migrate to more mature and managed environments such as Docker, Kubernetes, AWS Fargate and others.

"The detection and response functions in a single application through the container development pipeline is the key to securing containerized applications, as this same high-speed pipeline can be exploited by malicious people during execution," he says Philippe Courtot, Chairman and CEO Qualys. "Therefore, we need to increase security in cloud workloads and extend protection to running containers." Qualys extends defense capabilities in our Container Security solution by adding policy-driven response and behavior detection capabilities to protect containers operating in on-premise environments, public clouds, or public cloud containers as -a-service ".

For more information on the Qualys Container Security solution and to request a demo, sign up for the virtual conference Qualys Security Conference (November 9-24).

Qualys Container Security

Built on the Qualys Cloud Platform, Qualys Container Security discovers, tracks and protects containers from development to runtime. Container Security continuously reports and responds to security and compliance issues in containers across the hybrid IT environment. The implementation of runtime protection extends these capabilities and provides a complete and granular visibility during a container execution, allowing you to control and monitor the execution according to different rules. As a result, it is possible to recognize a deviation from the expected behavior that potentially creates a security risk due to a vulnerability or misconfiguration.

Tagged under: Container Security, Qualys

About Grandangolo Communications

What you can read next

Sumedh Thakar is the new CEO of Qualys
Qualys appoints Allan Peters as its new Chief Revenue Officer
The CIS relies on Qualys to provide its members with continuous monitoring of digital certificates and SSL / TLS configurations

Customer Press Room

  • Vertiv contributed to the development of the VSIX data center in Padua: more connectivity and efficiency for the territory

    Una soluzione all’avanguardia per l&#8217...
  • ESET analyzes the tools of the APT Thewizards group, affiliated to China, with objectives in Asia and Middle East

    The experts of ESET Research have discovered and to ...
  • Sentinelone with Purple release to the 'Athena' extends the functionality of Deep Security Reasoning, Agentic Detection and Response and the Workflows of Hyperautomation to any Siem or data source

    The leader of cybersecurity to the new ...
  • D-Link brings intelligent connectivity to SPS Italia 2025: industrial solutions for automation and connected factory

    The Vendor presents industrial switches and routers ...
  • ESET expands MSP support with Kaseya Vsa X

    The Vendor integrates the protection solutions for ...

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018

Categories

  • A10
  • abstract
  • Abstract
  • Acronis
  • Ally Consulting
  • Arrow
  • Arrow Electronics
  • Axiante
  • Babel
  • Computer Center
  • Cohesity
  • Italy Cloud Consortium
  • Consys
  • D-Link
  • Eset
  • G.B. Service
  • Habble
  • HiSolution
  • HYCU
  • Icos
  • Information Tecnology
  • Ivanti
  • Link11
  • MobileIron
  • Netalia
  • Nethive
  • Nexthink
  • Nuvis
  • Praim
  • QAD
  • Qualys
  • Red Hot Cyber
  • Riverbed
  • Saviynt
  • Sensormatic
  • SentinelOne
  • Talent Software
  • Vectra
  • Vectra AI
  • Vertiv

Office printing, digital PR, marketing, lead generation: all projects are born from our passion and expertise, with an inevitable touch of creativity and innovation.

COMPANY

Grandangolo Communications Srl
Via Sardegna 19
20146 Milano
Telephone +39 335 8283393
info@grandangolo.it

I SERVIZI

  • Home
  • Company
  • Services
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages

CONTACTS

  • Contacts
  • Cookie policy
  • Privacy policy

© 2019 GRANDANGOLO COMMUNICATIONS SRL | P.IVA IT 06394850967 | All rights reserveD.

Powered by Webpowerplus

TOP