IronClad Releases ICEMicro
November 14, 2017

IronClad Encryption Corporation announced the availability of ICEMicro, a context-free and natively-secure container that enables all developers to take ownership of application data security.

Utilizing ICEMicro, any developer can secure communication between containers across disparate scheduling and orchestration platforms, IaaS services, transport-layer security protocols, and on-premises or hybrid environments using Docker-compatible hypervisors. ICEMicro gives DevOps teams a way to build, deploy and run secure applications without the costs associated with legacy security strategies.

ICEMicro “Community Edition” images are available free now via Github and Docker Hub.

"ICEMicro is the simplest, most effective, and reliable means of securing vulnerable communications between docker containers," said JD McGraw, President and CEO of IronClad Encryption. "Up to this point, unmanageable encryption overhead has prompted developers to transfer encryption responsibilities to business operations, ultimately inflating costs."

ICEMicro provides developers with a natively secure container image to package application code. Since secure communications are an inherent feature, any two ICEMicro containers can communicate securely "out of the box."

ICEMicro includes: "ICECube," a native Docker container TLS solution that ensures low-overhead communication between containers; "ICEMan," a symmetric TLS library written in Python that encrypts and decrypts egress and ingress layer 4 traffic (respectfully) using configurable symmetric encryption TLS cipher suites; and "ICECore," IronClad’s proprietary and patented technology that abstracts Docker services into a Trustplane. The Trustplane secures data in transit simply and reliably, allowing developers to ensure data integrity without concern for Data Plane and Control Plane configurations or security vulnerabilities. With applications running in natively-secured ICEMicro containers, VPNs are no longer the vulnerable and expensive chokepoint that limits multi-environment deployments.

Developers will gain significant speed and efficiency using ICEMicro, as securing communications between two containers is accomplished as quickly as applications can be created. ICEMicro does not require additional development overhead or network security expertise.

"The ICECore library is 2.5 times faster than the most used open source python crypto wrapper, meaning that cross-platform networks can now be effectively secured without suffering unacceptable latencies," said McGraw.

ICEMicro allows developers to secure communications between two containers in as little as five minutes which is ideal for DevOps teams utilizing Continuous Delivery practices. Using ICEMicro, developers can ensure security between containers that are running on:

- A single IaaS platform and a single Docker management platform such as Amazon Web Services (AWS) and a local Kubernetes deployment.

- Multiple IaaS platforms such as Google Compute Engine (Kubernetes) and AWS EC2 Container Service (ECS)

- Hybrid IT environments such as colocation (hypervisor) and AWS ECS

Unlike most current strategies, ICEMicro does not depend on the transport layer for data security. However, it is compatible with any transport layer security protocol. Transport layer security protocol vulnerabilities are well known. As quickly as protocol upgrades are deployed, hackers exploit new vulnerabilities. Networks deploying legacy TLS pose even higher risks. ICEMicro is agnostic to the TLS protocol and natively secures the communications between containers within legacy or greenfield environments, limiting successful TLS hacks access to encrypted data only. Essentially, ICEMicro renders TLS unnecessary.

"ICEMicro is ideal for software and embedded software developers who want to secure communications between applications, between devices including IoT devices or between applications and devices," said McGraw. "The use cases are limitless in any industry, let alone across industries."

The Latest

February 15, 2018

Organizations are focusing investments on security and analytics, while actively researching emerging technologies such as machine learning and artificial intelligence, according to the 2018 CIO Tech Poll: Tech Priorities survey ...

February 14, 2018

With so many other initiatives to manage, DevOps isn't a top priority for all companies now. Many organizations believe it's wiser to wait. But in fact, the business case to integrate now is very strong — in fact, it's "do or die" territory. This infographic outlines some key reasons why organizations should integrate their software delivery value stream immediately ...

February 12, 2018

Accelerating multi-cloud deployments are enabling organizations to select the cloud platform that best meets the requirements of a specific application, according to the 2018 State of Application Delivery report from F5 Networks. However, this also increases the challenges many companies face in managing operations and security across multiple clouds as they transform their application portfolio to compete in the digital economy ...

February 08, 2018

The slowness of enterprise IT departments to embrace automated, cloud-native solutions for the cloud infrastructure challenges they face has resulted in IT infrastructure that is often ungoverned and insecure. And this is despite the fact that the cloud can be more secure as traditional data centers ...

February 06, 2018

Bank IT teams must embrace that their DevOps capabilities will determine their agile capability. Agile breaks down the barrier between the business and IT, and operations must be treated as a critical element of an agile program. In modern software delivery, the business, development and operations must execute as a unified team. To achieve this, banks are increasingly turning to Continuous Integration (CI) practices as part of the solution ...

February 05, 2018

IT professionals show a heightened concern for cybersecurity risk related to API use, according to a new survey conducted by Imperva. Specifically, 63 percent of respondents are most worried about DDoS threats, bot attacks, and authentication enforcement for APIs ...

February 01, 2018

DevOps are pretty clear for application development, those same applications often have a database back-end. If DevOps is increasing the frequency and reliability of new features for applications, a slower pace of database development can slow down and hinder those same releases ...

January 30, 2018

Without a doubt, DevOps is becoming the go-to strategy for organizations of all industries and sizes looking to master digital transformation and provide the fastest value to customers through software delivery. It is becoming clear that organizations adopting DevOps need a true leader (or engineer) to keep the transformation on track. The following are some tips when hiring for DevOps ...

January 29, 2018

When was the last time your company experienced a significant database error? If it happened in the last 3 months, you’re in good company. In a recent study, 60% of respondents reported a crash or significant database error occurring in the last 6 months. Roughly one in ten respondents reported a serious database problem in the past week ...

January 25, 2018

You've already recognized that business transformation requires digital transformation. Your organization is staffed with the best and brightest developers ready to implement the innovative, business-differentiating technologies you need to attract, engage, and retain customers. And you've invested in scaling Agile, driving DevOps adoption, automating the Continuous Delivery pipeline, and all the other components involved in moving from ideation to delivery as rapidly as possible. So what could possibly go wrong? Testing ...

Share this