alcide

Alcide Blog

Cloud-native Security Provider

The Evolution of Serverless, Part 2: From Containers to Functions

Dec 5, 2018 10:32:47 AM / by Anatoly Aliev posted in serverless, cloud security, workload protection, microservices

0 Comments

 

Following part 1 of our blog series, here's part 2. 

Read More

Live from Re:Invent! Alcide Cloud Security Platform is Available on AWS Marketplace for Containers

Nov 27, 2018 3:09:19 PM / by Aviv Fattal posted in AWS, cloud security, workload protection, containers, marketplace

0 Comments

We are happy to announce that Alcide's Cloud-Native Security Platform it is now available on the new AWS Marketplace for Containers.

AWS has announced today, Tuesday November 27th, during AWS re:Invent week on AWS Marketplace for Containers which adds support for software products that use Docker containers.

Read More

The Evolution of Serverless, Part 1: From Microservices to Containers

Nov 7, 2018 8:03:37 AM / by Anatoly Aliev posted in serverless, cloud security, workload protection

0 Comments

 

The post is part one of a blog series on the evolution of serverless security. The process of building applications has changed over time. Today, applications are designed to make use of multiple public clouds in addition to on-premises IT resources. They are also designed to use microservices, containers, and serverless. Each of these steps has been part of the evolution of application design, moving us towards applications that are inextricably interwoven with the infrastructure and workload automation software that controls the applications themselves.

Read More

What Is ChatOps and How Does It Scale Up Cloud Security?

Oct 18, 2018 3:43:35 AM / by Elad Ishay posted in devsecops, cloud security, Slack, chatops

0 Comments

 

 

Here’s a recent scenario: an organization’s  security team receives an alert from the monitoring system on their Slack channel with the content below:


AWS Account : SomeCompany_Development

IAM User : joel.burns@company.com

AWS API : AllowSecurityGroupIngress

Source IP Address : xxx.xxx.xxx.xxx

Security Group ID : sg-4fxxx4dx

Security Group Region : us-east-2

IP Protocol : tcp

From : 22

To : 22

IPRange : 0.0.0.0/0

Read More

Micro-segmentation for Better Cloud Security

Oct 10, 2018 5:20:56 AM / by Tal Rom posted in cloud security, Micro segmentation, workload protection

0 Comments

Micro-segmentation is an emerging practice that is quickly becoming a critical facet of cloud security. Its objective is not only to prevent compromise, but also to deal with what happens after compromise occurs. The purpose of micro-segmentation is to isolate applications and services from one another in order to prevent attackers from achieving their goalseven if they succeed in initially breaching the organization’s IT defenses.

Read More

Embedding Developers Know-how as Security Policy

Sep 5, 2018 7:43:11 AM / by Tal Rom posted in devsecops, cloud security, kubernetes

2 Comments

Deploying workloads in cloud environments comes with many benefits for businesses in terms of time to market, scalability, cost reduction and ease of use.

Read More

Knative Trifecta: Kubernetes, Serverless and Istio Service-mesh

Aug 8, 2018 1:03:00 PM / by Karine Regev posted in serverless, devsecops, cloud security, kubernetes

0 Comments

Trifecta: a variation of the perfecta in which a bettor wins by selecting the first three finishers of a race in the correct order of finish source

Read More

Cloud Security - Learning the Basics

Aug 7, 2018 7:51:33 AM / by Tal Rom posted in cloud security

0 Comments


This is the third post in a series focused on cloud security fundamentals.

Read More

Cloud Network Management and Security

Jul 26, 2018 4:31:48 AM / by Tal Rom posted in cloud security

1 Comment

The post is part two of a blog series on cloud security basics and fundamentals. In this instalment, cloud network management and security are addressed.

Read More

Cloud Security and the Shared Responsibility Model

Jul 4, 2018 12:47:48 PM / by Ranny Nachmias posted in cloud security

1 Comment

 

The post is part of three-part blog series on cloud security basics and fundamentals. In this installment, cloud security and the shared responsibility model are addressed.

Read More