Solutions Review Best of 2018: Top Container Security Articles

Container Security Articles

With the end of the year nearly upon us, the editors at Solutions Review thought now is the time to reflect upon our coverage of container security. Enterprises can find securing containers confusing and complex. Part of our job here is to demystify container security and make selecting the right solution easier through our extensive container security articles.

What is the User’s Responsibility in Container Security?

At the AWS Summit New York, I met with Mark Brooks, Alert Logic‘s global VP of solution engineering, to discuss the state container security. Alert Logic provides protection to all layers of web applications and the infrastructure stack. I followed up with Mark to ask him some questions for the site. He provided great insights into container security and the user’s role in this security. Due to the depth of Mark’s answers, this interview will be posted in two parts.

The State of Container Security and What to Expect in The Future

To gain some key industry insights, we chatted with Kris Raney from Ixia Solutions GroupKeysight Technologies. Kris is a distinguished engineer who dives into new areas for Keysight Technologies. He finds new tools and uses cases to develop business strategies.

How To Prevent Failure In Containerized Environments

To help with managing and understanding threats, Gremlin created their failure-as-a-service software. Gremlin provides users the ability to simulate failures in real time. This builds a greater understanding of system flaws. The software also allows teams to practice for a real failure or threat.

The company recently released capabilities for containers. Gremlin’s new container attack simulation gives users the chance to experience an attack or failure in real time. This kind of experience is invaluable. I recently chatted with Gremlin’s security officer, Frederic Bull, to gain a deeper understanding of container security.

The Commonly Overlooked Issues in Container Security

Many enterprises turn to container security solutions to improve functionality. However, solutions in this space still need time to grow. No provider offers an all-encompassing container security tool. Some enterprises use multiple container security tools to build a more expansive suite. Integration between these solutions often proves difficult though. This was the primary takeaway when I asked industry experts their thoughts on overlooked container security concerns.

Doug Atkinson

An entrepreneur and executive with a passion for enterprise technology, Doug founded Solutions Review in 2012. He has previously served as a newspaper boy, a McDonald's grill cook, a bartender, a political consultant, a web developer, the VP of Sales for e-Dialog - a digital marketing agency - and as Special Assistant to Governor William Weld of Massachusetts.