IronClad Releases ICEMicro
November 14, 2017

IronClad Encryption Corporation announced the availability of ICEMicro, a context-free and natively-secure container that enables all developers to take ownership of application data security.

Utilizing ICEMicro, any developer can secure communication between containers across disparate scheduling and orchestration platforms, IaaS services, transport-layer security protocols, and on-premises or hybrid environments using Docker-compatible hypervisors. ICEMicro gives DevOps teams a way to build, deploy and run secure applications without the costs associated with legacy security strategies.

ICEMicro “Community Edition” images are available free now via Github and Docker Hub.

"ICEMicro is the simplest, most effective, and reliable means of securing vulnerable communications between docker containers," said JD McGraw, President and CEO of IronClad Encryption. "Up to this point, unmanageable encryption overhead has prompted developers to transfer encryption responsibilities to business operations, ultimately inflating costs."

ICEMicro provides developers with a natively secure container image to package application code. Since secure communications are an inherent feature, any two ICEMicro containers can communicate securely "out of the box."

ICEMicro includes: "ICECube," a native Docker container TLS solution that ensures low-overhead communication between containers; "ICEMan," a symmetric TLS library written in Python that encrypts and decrypts egress and ingress layer 4 traffic (respectfully) using configurable symmetric encryption TLS cipher suites; and "ICECore," IronClad’s proprietary and patented technology that abstracts Docker services into a Trustplane. The Trustplane secures data in transit simply and reliably, allowing developers to ensure data integrity without concern for Data Plane and Control Plane configurations or security vulnerabilities. With applications running in natively-secured ICEMicro containers, VPNs are no longer the vulnerable and expensive chokepoint that limits multi-environment deployments.

Developers will gain significant speed and efficiency using ICEMicro, as securing communications between two containers is accomplished as quickly as applications can be created. ICEMicro does not require additional development overhead or network security expertise.

"The ICECore library is 2.5 times faster than the most used open source python crypto wrapper, meaning that cross-platform networks can now be effectively secured without suffering unacceptable latencies," said McGraw.

ICEMicro allows developers to secure communications between two containers in as little as five minutes which is ideal for DevOps teams utilizing Continuous Delivery practices. Using ICEMicro, developers can ensure security between containers that are running on:

- A single IaaS platform and a single Docker management platform such as Amazon Web Services (AWS) and a local Kubernetes deployment.

- Multiple IaaS platforms such as Google Compute Engine (Kubernetes) and AWS EC2 Container Service (ECS)

- Hybrid IT environments such as colocation (hypervisor) and AWS ECS

Unlike most current strategies, ICEMicro does not depend on the transport layer for data security. However, it is compatible with any transport layer security protocol. Transport layer security protocol vulnerabilities are well known. As quickly as protocol upgrades are deployed, hackers exploit new vulnerabilities. Networks deploying legacy TLS pose even higher risks. ICEMicro is agnostic to the TLS protocol and natively secures the communications between containers within legacy or greenfield environments, limiting successful TLS hacks access to encrypted data only. Essentially, ICEMicro renders TLS unnecessary.

"ICEMicro is ideal for software and embedded software developers who want to secure communications between applications, between devices including IoT devices or between applications and devices," said McGraw. "The use cases are limitless in any industry, let alone across industries."

The Latest

September 18, 2018

To celebrate IT Professionals Day 2018 (this year on September 18), the SolarWinds IT Pro Day 2018: A World Powered by Tech Pros survey explores a "Tech PROactive" world where technology professionals have the time, resources, and ability to use their technology prowess to do absolutely anything ...

September 17, 2018

The role of DevOps in capitalizing on the benefits of hybrid cloud has become increasingly important, with developers and IT operations now working together closer than ever to continuously plan, develop, deliver, integrate, test, and deploy new applications and services in the hybrid cloud ...

September 13, 2018

"Our research provides compelling evidence that smart investments in technology, process, and culture drive profit, quality, and customer outcomes that are important for organizations to stay competitive and relevant -- both today and as we look to the future," said Dr. Nicole Forsgren, co-founder and CEO of DevOps Research and Assessment (DORA), referring to the organization's latest report Accelerate: State of DevOps 2018: Strategies for a New Economy ...

September 12, 2018

This next blog examines the security component of step four of the Twelve-Factor methodology — backing services. Here follows some actionable advice from the WhiteHat Security Addendum Checklist, which developers and ops engineers can follow during the SaaS build and operations stages ...

September 10, 2018

When thinking about security automation, a common concern from security teams is that they don't have the coding capabilities needed to create, implement, and maintain it. So, what are teams to do when internal resources are tight and there isn't budget to hire an outside consultant or "unicorn?" ...

September 06, 2018

In evaluating 316 million incidents, it is clear that attacks against the application are growing in volume and sophistication, and as such, continue to be a major threat to business, according to Security Report for Web Applications (Q2 2018) from tCell ...

September 04, 2018

There's a welcome insight in the 2018 Accelerate State of DevOps Report from DORA, because for the first time it calls out database development as a key technical practice which can drive high performance in DevOps ...

August 29, 2018

While everyone is convinced about the benefits of containers, to really know if you're making progress, you need to measure container performance using KPIs.These KPIs should shed light on how a DevOps team is faring in terms of important parameters like speed, quality, availability, and efficiency. Let's look at the specific KPIs to track for each of these broad categories ...

August 27, 2018

Protego Labs recently discovered that 98 percent of functions in serverless applications are at risk, with 16 percent considered "serious" ...

August 23, 2018

After another record year of breaches, The 2018 DevSecOps Community Survey found that 3 in 10 respondents suspected or verified breaches stemming from vulnerabilities in open source components — a 55% increase over 2017, and 121% increase since 2014 ...

Share this