Docker Enterprise Edition 2.0 Released
April 24, 2018

Docker announced Docker Enterprise Edition (EE) 2.0, an enterprise-ready container platform to manage and secure applications on Kubernetes in multi-Linux, multi-OS and multi-cloud customer environments.

Docker EE provides organizations with choices – from orchestration (Kubernetes and Swarm) to applications (legacy or cloud native) to infrastructure (cloud or on premises) – enabling IT leaders to advance their digital and cloud initiatives with the flexibility needed to make adjustments as business requirements evolve.

In keeping with Docker’s heritage of making complex technology easy to use, Docker EE provides a unified operational model that simplifies the use of Kubernetes for those that want the capabilities for their application delivery environment, but do not want to hire a team of Kubernetes experts. With Docker EE, security is built in every step of the way, ensuring organizations have security and governance over their containers without slowing down software delivery.

Docker EE eliminates risk for organizations by providing the freedom to choose how, when and where to innovate their applications without the fear of technology or infrastructure lock-in. Organizations can start big or small, with legacy or cloud-native applications, using any application stack on any OS, across any infrastructure, whether it be on prem or across multiple clouds and still have the same Docker experience throughout the application lifecycle.

As part of Docker EE 2.0, organizations have these capabilities:

- Multi-OS Support: Availability across certified infrastructure platforms, including multiple Linux distributions (SLES, CentOS, RHEL, Ubuntu, Oracle Linux) and Windows Server.

- Multi-Cloud: Organizations are not locked into an underlying infrastructure and get the greatest flexibility in hybrid cloud deployments across all major clouds including AWS and Azure.

- Orchestration Choice: Docker EE is the only platform that runs both Swarm and Kubernetes simultaneously on the same cluster - so developers do not need to make an orchestration choice. Operations teams have the flexibility to choose orchestrators interchangeably.

- Networking: Consistent with Docker’s “batteries included but swappable” model, Docker EE offers integrated secure networking through Project Calico by and in collaboration with Tigera, Docker’s integration partner for Calico. With this CNI integration, organizations get a fully-supported Kubernetes solution with Project Calico built-in - the only one that works uniformly across the leading Linux OSes and the major cloud providers. Companies with networking plugins that are certified or being certified on

- Docker Enterprise Edition 2.0 include: Cisco Contiv, Infoblox and Weaveworks.

- Storage: Companies with volume plugins that are certified or being certified on Docker Enterprise Edition 2.0 include: Blockbridge, Dell EMC, Hedvig, HPE/Nimble, NetApp, Nexenta, Portworx, Pure Storage, StorageOS, Veritas, Virtuozzo.

All certified containers in Docker Store continue to work on Docker EE certified infrastructure.

“Enterprises are investing heavily in containers to enable their strategic IT initiatives, but to further drive success, they need a container platform that addresses the scale and operational requirements of a global business,” said Scott Johnston, Chief Product Officer at Docker. “In working closely with our customers, we developed Docker EE 2.0 to meet these enterprise needs and bring the unique security, portability and agility benefits of the Docker platform to Kubernetes. From ensuring end-to-end security across a globally-distributed IT organization to enabling existing teams to operationalize Kubernetes, Docker EE 2.0 provides the foundation for enterprises to innovate at their own pace, without fear of vendor lock-in.”

Docker EE simplifies day-to-day operational tasks when using Kubernetes - similar to how Docker has operationalized Swarm. Docker EE allows you to leverage your existing team and processes to adopt and operationalize Kubernetes. For example, Docker EE offers:

- GUI-based operational workflows for simplified yet powerful Role-based Access Control (RBAC) as well as cluster and registry management.

- Secure application zones that provide logical and physical separation of applications within the same cluster. This approach maximizes both operational efficiency and infrastructure utilization leading to significant cost savings.

Docker EE streamlines managing Kubernetes; however, operations teams also have access to raw Kubernetes components that run atop a full-featured, CNCF conformant Kubernetes stack. Accordingly, Kubernetes-native APIs, CLIs and interfaces are available to advanced users seeking to fine tune and troubleshoot the orchestrator.

Docker EE brings a complete secure supply chain to Kubernetes in the same way it has for Swarm. Combining Docker image signing and scanning with policy-based image promotions allows organizations to build governance over the container environment without impeding the speed of development and application delivery.

To tailor these capabilities to globally distributed organizations, Docker EE 2.0 comes with new functionality within its trusted registry for image caching and mirroring. These features ensure that centrally stored images can be propagated to regional registries for better performance and replicated for higher availability. The result is that organizations with software projects that span multiple continents can seamlessly and securely share their software within a given development team. When one part of the organization is done for the day, they can sign their content, push it to the private registry and then have the content changes automatically cached, for a hand-off, in other private registries around the globe.

The Docker Desktop integration of a complete Kubernetes stack ensures that developers can seamlessly leverage features like multi-stage builds, application composition (Docker Compose) and in-container development and have them run consistently from development all the way to production. Developers have the flexibility to write their application with Docker and then can choose their orchestrator without requiring any additional modification. Similarly developers can maintain their Docker native workflows, while experimenting with Kubernetes native tools and commands.

Docker Enterprise Edition 2.0 and Docker Desktop for Mac and Windows are immediately available.

The Latest

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

August 02, 2018

Results from new Forrester Consulting research reveal the 20 most important Agile and DevOps quality metrics that separate DevOps/Agile experts from their less advanced peers ...

July 31, 2018

Even organizations that understand the importance of cybersecurity in theory often stumble when it comes to marrying security initiatives with their development and operations processes. Most businesses agree that everyone should be responsible for security, but this principle is not being upheld on a day-to-day basis in many organizations. That’s bad news for everyone. Here are some best practices for implementing SecOps ...

July 30, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps is a methodology that seeks to address this by operationalizing and hardening security throughout the software lifecycle ...

July 26, 2018

Organizations are shifting away from traditional, monolithic architectures, with three-quarters of survey respondents delivering at least some of their applications and more than one-third delivering most of their applications as microservices, according to the State of DevOps Observability Report from Scalyr ...

July 24, 2018

What top considerations must companies make to ensure – or at least help improve – Agile at scale? The following are key techniques and practices to help accelerate Agile delivery rollouts and scale Agile and DevOps in the Enterprise ...

Share this