IronClad Releases ICEMicro
November 14, 2017

IronClad Encryption Corporation announced the availability of ICEMicro, a context-free and natively-secure container that enables all developers to take ownership of application data security.

Utilizing ICEMicro, any developer can secure communication between containers across disparate scheduling and orchestration platforms, IaaS services, transport-layer security protocols, and on-premises or hybrid environments using Docker-compatible hypervisors. ICEMicro gives DevOps teams a way to build, deploy and run secure applications without the costs associated with legacy security strategies.

ICEMicro “Community Edition” images are available free now via Github and Docker Hub.

"ICEMicro is the simplest, most effective, and reliable means of securing vulnerable communications between docker containers," said JD McGraw, President and CEO of IronClad Encryption. "Up to this point, unmanageable encryption overhead has prompted developers to transfer encryption responsibilities to business operations, ultimately inflating costs."

ICEMicro provides developers with a natively secure container image to package application code. Since secure communications are an inherent feature, any two ICEMicro containers can communicate securely "out of the box."

ICEMicro includes: "ICECube," a native Docker container TLS solution that ensures low-overhead communication between containers; "ICEMan," a symmetric TLS library written in Python that encrypts and decrypts egress and ingress layer 4 traffic (respectfully) using configurable symmetric encryption TLS cipher suites; and "ICECore," IronClad’s proprietary and patented technology that abstracts Docker services into a Trustplane. The Trustplane secures data in transit simply and reliably, allowing developers to ensure data integrity without concern for Data Plane and Control Plane configurations or security vulnerabilities. With applications running in natively-secured ICEMicro containers, VPNs are no longer the vulnerable and expensive chokepoint that limits multi-environment deployments.

Developers will gain significant speed and efficiency using ICEMicro, as securing communications between two containers is accomplished as quickly as applications can be created. ICEMicro does not require additional development overhead or network security expertise.

"The ICECore library is 2.5 times faster than the most used open source python crypto wrapper, meaning that cross-platform networks can now be effectively secured without suffering unacceptable latencies," said McGraw.

ICEMicro allows developers to secure communications between two containers in as little as five minutes which is ideal for DevOps teams utilizing Continuous Delivery practices. Using ICEMicro, developers can ensure security between containers that are running on:

- A single IaaS platform and a single Docker management platform such as Amazon Web Services (AWS) and a local Kubernetes deployment.

- Multiple IaaS platforms such as Google Compute Engine (Kubernetes) and AWS EC2 Container Service (ECS)

- Hybrid IT environments such as colocation (hypervisor) and AWS ECS

Unlike most current strategies, ICEMicro does not depend on the transport layer for data security. However, it is compatible with any transport layer security protocol. Transport layer security protocol vulnerabilities are well known. As quickly as protocol upgrades are deployed, hackers exploit new vulnerabilities. Networks deploying legacy TLS pose even higher risks. ICEMicro is agnostic to the TLS protocol and natively secures the communications between containers within legacy or greenfield environments, limiting successful TLS hacks access to encrypted data only. Essentially, ICEMicro renders TLS unnecessary.

"ICEMicro is ideal for software and embedded software developers who want to secure communications between applications, between devices including IoT devices or between applications and devices," said McGraw. "The use cases are limitless in any industry, let alone across industries."

The Latest

June 21, 2018

DevSecOps is quickly gaining support and traction, within and beyond information security teams. In fact, 70% of respondents believe their culture can embrace the change needed to fuse Security and DevOps, according to a new survey of 80 security professionals by Aqua Security ...

June 20, 2018

The larger the company size, the higher the proportion of low IT performers, according to the State of DevOps: Market Segmentation Report from Puppet, based on the 2017 State of DevOps Survey data ...

June 18, 2018

An overwhelming 83 percent of respondents have concerns about deploying traditional firewalls in the cloud, according to Firewalls and the Cloud, a survey conducted by Barracuda Networks...

June 14, 2018

Despite the vast majority of cloud management decision-makers believing that DevOps and microservice enablement are important, very few believe that their organizations are capable of delivering them today — a gap that is costing the average enterprise $34 million per year, according to new report from the Ponemon Institute ...

June 12, 2018

Dev teams are doing their best to give the customers what they want, but oftentimes find themselves in between a rock and a hard place. Teams are struggling to get up to speed with new tools that are meant to make their lives easier and more realistic to hit deadlines. With spring cleaning season upon us, take time this season to tune up agile processes and continue the work of advancing the shift towards DevOps ...

June 11, 2018

The ability to create a culture of DevOps is critical to any organization's ability to deliver applications and services at a high rate of speed, but can we clearly and concisely answer the question: What exactly is DevOps? Despite the best intentions, some large companies are struggling to understand what DevOps actually is, and what it takes to fully implement its concepts and reap its benefits ...

June 07, 2018

The Twelve-Factor App is a methodology that offers a 12-step best practice approach for developers to apply when building software-as-a-service apps that are both scalable and maintainable in a DevOps world. As software continues to be written and deployed at a faster rate and in the cloud, development teams are finding there is more room for failure and vulnerabilities. This blog series will discuss how to build a Twelve-Factor app securely ...

June 05, 2018

Everyone understands the importance of code quality for applications, particularly when DevOps results in releases becoming faster and faster, reducing the room for error. The same issues increasingly apply to databases, which are a vital part of DevOps workflows. Fail to integrate the database into DevOps and you'll face bottlenecks that slow down your processes and undermine your efforts ...

June 04, 2018

DevOps and security traditionally have been siloed functions and security is often seen as a policing function by DevOps team members. However, more mature business leaders are trying to bridge the gap between the two functions to achieve business excellence. This theme was evident from our recent survey where 39% of respondents cited that DevOps and development teams care greatly about their cybersecurity posture, showing that the silo between security/IT and development teams is diminishing ...

May 31, 2018

DEVOPSdigest asked experts from across the IT industry for their opinions on the top tools to support DevSecOps. Part 5, the last installment, offers some final thoughts about "tools" that are not necessarily technology ...

Share this