Kubernetes Security: K8s Is Both the Problem and the Solution

Kubernetes Security: K8s Is Both the Problem and the Solution

This IDC Perspective provides an in-depth review of Kubernetes security. Securing a Kubernetes environment is not like securing a virtualized collection of servers and applications. Kubernetes totally changes the rules of the software code protections game as applications move from monolithic to microservices based, linking hundreds or even thousands of loosely coupled services that are dynamic, ephemeral, and highly distributed, often with the support of third-party applications that have their own vulnerabilities and maintenance challenges. Building security into applications is now the model for modern application development and requires a "shift left" approach."The uniqueness of Kubernetes has customers demanding more comprehensive solutions. Bolt-on, after-the-fact security solutions are things of the past and just will not work. Modern application development requires the ability to build security into applications. Security should be viewed as a continuous process rather than products." — Frank Dickson, group vice president, Security and Trust at IDC.

Please Note: Extended description available upon request.


Executive Snapshot
Situation Overview
Advice for the Technology Buyer
Considering K8s Security Solutions
Visibility
Analytics
Cloud Security Posture Management Personas
Response and Remediation
Vendors to Consider
Aqua Security
Check Point
CrowdStrike
Microsoft
Palo Alto Networks
Sysdig
Trellix
Trend Micro
VMware/Broadcom
Guidance for the CIO
Learn More
Related Research
Synopsis

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings