Alert Logic, a leading provider of Security-as-a-Service solutions, announced major updates to the industry’s only Network Intrusion Detection System (NIDS) for containers.
The release adds container log management and extends capabilities beyond Amazon Web Services (AWS) to Microsoft Azure, on-premises and hosted environments.
Organisations gain a simplified, comprehensive picture of their risk through improved visibility into any workload in any container, as well as the ability to collect, aggregate and search container log data for improved security and compliance.
Available in Alert Logic Cloud Defender and Alert Logic Threat Manager solutions, these expanded capabilities provide businesses with a single interface to manage the security of all containers, track events and incidents, and gain unprecedented visibility into their attack surface.
Coverage includes real-time detection of known and unknown exploits that target applications running in containers on Docker, Kubernetes, Elastic Beanstalk, Docker Swarm, CoreOS, Azure Kubernetes Service, Amazon Elastic Container Service and Amazon Elastic Container Service for Kubernetes.
Because the new capabilities secure multi-cloud and multi-platform environments, container security is easily portable across platforms, allowing customers to take advantage of cost and operational efficiencies.
“Our NIDS-based approach to container security, combined with new container log management capabilities and integration across an organisation’s total – and often complex – environment, provides a more comprehensive view than other solutions available today,” said Chris Noell, Senior Vice President, Engineering at Alert Logic.
“Businesses employ containers for ease and speed of deployment, yet struggle to maintain consistent security as they move containers across cloud, hosted and on-prem environments. Alert Logic solves this challenge by making security as portable as your containers, without any lag or disruption to business operations.”
Organisations can simplify their approach by leveraging one solution to protect all workloads and to reduce complexity in multiple areas:
- Visualise which containers and hosts may be compromised
- Examine associated metadata
- Explore remediation recommendations
- Support existing security policies and workflow
- Provide a holistic view of attacks