Capsule8 1.0 Released
April 11, 2018

Capsule8 announced the general availability of Capsule8 1.0, a real-time, zero-day attack detection platform capable of scaling to massive production deployments.

Following a successful beta with some of the biggest companies from Wall Street and Silicon Valley, Capsule8 is delivering continuous security across the entire production environment, both containerized and legacy, to detect and shut down attacks as they happen. Lyft, the fastest growing rideshare company in the US, is among the first to use the Capsule8 platform for attack detection.

As organizations modernize their production environments with technologies like cloud, microservices and containers, they face a changing attack surface that conventional security solutions can’t address. And with vulnerabilities such as Meltdown and Spectre, legacy Linux infrastructures are also up against inadequate protection caused by low visibility and poor detection. Capsule8 was built to protect today’s modern production environment and solve the most critical security challenges associated with containerized, virtualized and bare metal infrastructures in a single, scalable solution.

Capsule8 detects and can instantly disrupt attacks in the production environment before the attack takes hold.

Key features of Capsule8 1.0 include:

- Real-time Detection at Scale: Capsule8 utilizes distributed, expert-driven analytics to detect zero-day attacks in real time, reducing an organization’s typical flood of alarms and false positives to a trickle of high value, high context alerts of real attacks. Also, unlike conventional detection approaches that don’t scale, Capsule8 relies on distributed architecture that can scale detection to tens of thousands of nodes – without impacting performance.

- Built for Production: When an organization’s system or network is under heavy load, Capsule8 responds appropriately to ensure overall performance isn’t impacted, all without deploying any kernel modules or high-risk components. Plus, it deploys alongside an organization’s infrastructure, not as a SaaS solution, leaving full control of data to the customer and eliminating the risks of potential dissemination, deletion, or corruption of your data by third parties.

- Intelligent Investigation: Capsule8’s distributed telemetry makes it easy to perform forensic investigations on historical data, without significant impact to network performance or storage.

- Automated Disruption: Capsule8 can go beyond detection and makes it easy for companies to automatically disrupt an attack once detected. For instance, customers can strategically (and automatically) kill attacker connections, restart workloads, or alert an investigator, immediately upon initial detection.

- Support for Cloud Native and Legacy: Capsule8 supports both orchestrated and non-orchestrated workloads. Capsule8 deploys easily in a Kubernetes orchestrated environment through cloud providers such as AWS, GCP or Azure, as well as bare metal environments deployed with your operations tools of choice such as Ansible, Puppet, Chef or SaltStack.

- Easy Third-Party Integration: Capsule8’s API-first approach allows for simple integration with alert management systems, communication tools, SIEMs, orchestration tools and big data stores allowing security teams to monitor activity using the tool of their choice.

“Production environments most often hold an organization’s most valuable assets, yet they are the most vulnerable to the industry’s worst attacks. The security industry has been unable to effectively detect attacks at the scale required for production environments — until now,” said John Viega, co-founder and CEO, Capsule8. “Capsule8 1.0 was built to protect today’s modern production environments and solve the challenge of detecting — and even shutting down — zero-day attacks within both containerized and legacy Linux infrastructures. We are blown away by the customer traction we are already seeing and truly humbled by the caliber of companies, like Lyft, turning to us to solve this critical problem.”

The Latest

April 24, 2018

Developers and engineering teams are under increasing pressure to release higher quality software faster. Continuous testing has proven to be central to these efforts as it helps eliminate bottlenecks and ensures that automated testing is a constant throughout the development process, not an exercise relegated to the "last mile." The value of automated testing is more evident than ever before, with nearly half the respondents reporting that management is fully committed to automated testing and with plans to increase spending, according to the recent Sauce Labs Testing Trends for 2018 report ...

April 19, 2018

As development speed has become a competitive advantage, the DevOps team has sought to enable continuous integration and continuous delivery (CI/CD). For the CI/CD process to be successful, it must be fast and efficient. Any potential roadblocks that delay any part of the process increase cycle times and slow down delivery ...

April 18, 2018

The top barriers to DevOps adoption involve stagnant organizational cultures; managing the jumble of legacy processes, IT infrastructure and newly created cloud environments; and growing software complexity that impacts application modernization initiatives ...

April 16, 2018

This is the third in a series of three blogs directed at recent EMA research on the digital war room. In this blog, we'll look at three areas that have emerged in a spotlight in and of themselves — as signs of changing times — let alone as they may impact digital war room decision making. They are the growing focus on development and agile/DevOps; the impacts of cloud; and the growing need for security and operations (SecOps) to team more effectively ...

April 12, 2018

Only 52 percent of developers using commercial or open source components in their applications update those components when a new security vulnerability is announced, according to new research conducted by Vanson Bourne for CA Veracode, part of CA Technologies. This highlights organizations' lack of security awareness and puts organizations at risk of a breach ...

April 10, 2018

For a few years now, it has seemed like agile developers and DevOps teams haven't been giving testing its proper due. One could almost picture them thinking, "So what if there's a bug, design flaw or performance issue. We'll fix it in the new version next week." Of course, this line of thinking has turned out to be a big mistake ...

April 09, 2018

Government IT professionals surveyed, as part of F5 Networks' State of Application Delivery report, made it clear they are heavily focused on building the foundation necessary for application-driven digital transformation. Around the world, government organizations are shifting towards digital government, and with that we see government organizations embracing the cloud, adopting automation and orchestration, and adjusting security strategies ...

April 05, 2018

The digital war room — physical, virtual or hybrid — is not in retreat but in fact is growing in scope to include greater participation from development and security. It's also becoming more proactive, with on average more than 30% of "major incidents" before they impacted business service performance. In this blog I'm providing a few additional highlights from the insights we got on digital war room organization and processes ...

April 04, 2018

Many development organizations rely on DevOps, Agile and Continuous Integration/Continuous Delivery (CI/CD) practices and tools to speed up application delivery. However, shorter release cycles and faster application development also mean more frequent database schema and logic changes. Though the application release process has been fast-tracked through modernization and automation, the database deployment process has been forsaken ...

April 02, 2018

As March Madness is well underway, the journey to the NCAA basketball national championship feels much like the journey many organizations are on to achieve business success through digital transformation ...

Share this