Know the Risk: Digital Transformation's Impact on Your Business-Critical Applications REGISTER >
Less than a week after NeuVector announced it had raised $7 million in Series A funding round, the company announced version of 1.3 of its container security platform.
New to the platform are tunneling, reverse shell connection and suspicious process detection capabilities that detect attack attempts and help keep their application containers protected. A packet capture feature guards against packet sniffing and an upgraded vulnerability database sniffs out more threats than before.
NeuVector can also detect process and privilege escalations in hosts and containers, techniques used to probe an environment's defenses or spread malware. Automatic forensic capture tools record the details of each attack, enabling security teams to shore up their protections. Also new are north-south traffic path recognition and the ability to disable policy rules.
Version 1.3 also ushers in an Enterprise edition with DNS name policy capabilities and other features for large-scale deployments.
It offers an REST API integration, enabling businesses to incorporate the products protections into their continuous integration and continuous delivery pipelines, according to NeuVector. SAML (Security Assertion Markup Language) and LDAP (Lightweight Directory Access Protocol) integration, single sign-on support and webhook notifications are among the several business-friendly capabilities in the Enterprise edition.
"As businesses increasingly make containers an integral part of their IT strategy – and as threats to container environments evolve – it's crucial that they have comprehensive security capabilities in-line with their specific requirements," said NeuVector CEO Fei Huang in a statement. "We're proud to introduce the new versions of NeuVector that are uniquely designed to deliver the container security needs of businesses today."
Businesses are indeed increasingly turning to Docker and other container platforms for their application delivery needs. Cybersecurity vendors, meanwhile, are responding with products that help thwart attacks.
A recent survey from Aqua Security, another container security company, revealed that 50 percent of IT professionals using containers have them deployed in production.
Last month, Twistlock released 2.2 version of its container security solution, which includes an updated Incident Explorer tool that uses AI to connect the dots on discrete audit events that could indicate an attack. IBM and Google recently announced they were working on the open source Grafeas project to help organizations secure their applications by collecting the metadata generated by container setup, enabling providing security visibility and a foundation for policy enforcement.