NeuVector enhances Red Hat OpenShift availability with role-based access controls for automated run-time container security

NeuVector expanded on Tuesday its support for Red Hat OpenShift Container Platform by adding availability for role-based access controls (RBACs). The new capability can instantly enable developers, architects, DevOps personnel, and security teams to achieve more complete security visibility and management for Red Hat OpenShift-deployed containers. It also adds Red Hat Container Registry scanning and a Jenkins plugin to automate vulnerability scanning during development.

Enterprises can now deploy Red Hat OpenShift Container Platform with added confidence knowing that the same access controls created for Red Hat OpenShift Container Platform can also be applied to the management of the NeuVector multi-vector firewall. NeuVector is among the first Red Hat Certified firewall containers available for Red Hat OpenShift Container Platform, and it is listed in the Red Hat Container Catalog.

NeuVector is a vendor of Kubernetes security and delivers multi-vector container firewall – which enables the confident deployment of enterprise-wide container strategies across multi-cloud and on-premise environments. NeuVector provides east-west container traffic visibility, container protection, and host security in a highly integrated, automated security solution. Founded by industry veterans from Fortinet, VMware, and Trend Micro, NeuVector has developed patent-pending behavioral learning for container security.

NeuVector provides a highly integrated and automated security solution for safeguarding Kubernetes environments against container threats, violations, and vulnerabilities throughout the entire application lifecycle – including protections against sophisticated insider attacks.

Proper controls for limiting access to Red Hat OpenShift and NeuVector resources are a critical requirement for preventing insiders with bad intentions from executing unauthorized operations. With this extension of its capabilities for Red Hat OpenShift, NeuVector now fully utilizes Red Hat OpenShift RBACs to help defend container tools from insider threats.

Additionally, the NeuVector capabilities now enable Red Hat Container Registry images to be easily scanned for vulnerabilities using NeuVector’s container security solution. With this new capability, enterprises can have automated image scanning integrated into their CI/CD processes from day one.

NeuVector is also making a Jenkins plugin available that introduces automated scanning in the image build process. Customers using Jenkins in their integration and build processes can set policies for allowing or failing builds based on whether vulnerabilities are detected in the images. The automated registry and image build-time scanning is designed to ensure that known vulnerabilities are not introduced into the application development and deployment lifecycle.

The NeuVector multi-vector container firewall is designed to further protect Red Hat OpenShift containers during run-time, guarding against zero-day attacks and even exploits of yet unknown vulnerabilities.

“Red Hat OpenShift Container Platform is an enterprise Kubernetes platform designed to bridge the needs of developers and IT operations teams and provide a consistent application and service experience across hybrid cloud infrastructures,” said Chris Morgan, global technical director, OpenShift Partner Ecosystem at Red Hat. “We are happy to collaborate with NeuVector to offer these users more confidence and more choice for added container security as they deploy container-based apps in production with OpenShift.”

“Organizations developing and deploying applications through the OpenShift container management platform require thorough and automated container security,” said Gary Duan, CTO, NeuVector. “With these enhancements to the NeuVector for Red Hat OpenShift Container Platform, we’re proud to strengthen security automation by leveraging role-based access and by incorporating image scanning which helps safeguard the integrity of container-based applications throughout the entirety of their lifecycles.”


Leave a Reply

WWPI – Covering the best in IT since 1980