NeuVector 2.0 Announced
April 12, 2018

NeuVector announced NeuVector 2.0, an enhanced security solution that further protects Kubernetes environments by building on the unique NeuVector run-time security automation, which combines east-west traffic visibility with container process monitoring and vulnerability scanning.

NeuVector 2.0 adds important new capabilities that include a Kubernetes incident response system alongside advanced process and file system protections to secure against new attack vectors.

Enterprises require fast and decisive responses when security incidents and potential attacks occur within Kubernetes deployments. NeuVector 2.0 deploys within an organization’s existing security processes to rapidly address and mitigate ongoing container threats. When NeuVector detects threats and vulnerabilities, the new auto-response rules – built to address common container attacks and security alerts – instantly provide response actions to protect containers and generate alerts. These rules can also be customized to match criteria such as specific container vulnerability profiles, or set to address suspicious activity across multiple threat vectors – including the container network, processes, or file system. NeuVector 2.0 provides a unique range of incident responses, with full capabilities to quarantine compromised containers, generate custom notifications, and whitelist non-critical events. Using NeuVector 2.0, enterprises can fully address container security events and protect their applications, container services, and infrastructure from multi-vector attacks.

NeuVector 2.0 also adds new automated protections that detect exploits within containers, such as suspicious processes or file system activities. The security solution automatically calculates a baseline of container processes, whitelists legitimate activity, and alerts on any deviation from the baseline. Any installation of malicious packages, libraries, or new executables – or any modification to sensitive files – triggers NeuVector to scan the container for vulnerabilities and alert on the suspicious activity. These automatic protections do not require configuration but do allow for easy customization of whitelist/blacklist rules as desired. The new capabilities bolster NeuVector’s multi-vector firewall by adding deeper insights into activities within Kubernetes deployments, further safeguarding containers from process and file system attack vectors.

“The highly dynamic nature of Kubernetes environments makes robust and responsive threat automation a critical requirement to enterprise security,” said Fei Huang, CEO, NeuVector. “The release of NeuVector 2.0 offers rapid detection and response that addresses security threats as they occur, while protecting systems from process and file system-based attacks. We focus on continually automating the real-time security of Kubernetes deployments for enterprises using our solution.”

The Latest

April 24, 2018

Developers and engineering teams are under increasing pressure to release higher quality software faster. Continuous testing has proven to be central to these efforts as it helps eliminate bottlenecks and ensures that automated testing is a constant throughout the development process, not an exercise relegated to the "last mile." The value of automated testing is more evident than ever before, with nearly half the respondents reporting that management is fully committed to automated testing and with plans to increase spending, according to the recent Sauce Labs Testing Trends for 2018 report ...

April 19, 2018

As development speed has become a competitive advantage, the DevOps team has sought to enable continuous integration and continuous delivery (CI/CD). For the CI/CD process to be successful, it must be fast and efficient. Any potential roadblocks that delay any part of the process increase cycle times and slow down delivery ...

April 18, 2018

The top barriers to DevOps adoption involve stagnant organizational cultures; managing the jumble of legacy processes, IT infrastructure and newly created cloud environments; and growing software complexity that impacts application modernization initiatives ...

April 16, 2018

This is the third in a series of three blogs directed at recent EMA research on the digital war room. In this blog, we'll look at three areas that have emerged in a spotlight in and of themselves — as signs of changing times — let alone as they may impact digital war room decision making. They are the growing focus on development and agile/DevOps; the impacts of cloud; and the growing need for security and operations (SecOps) to team more effectively ...

April 12, 2018

Only 52 percent of developers using commercial or open source components in their applications update those components when a new security vulnerability is announced, according to new research conducted by Vanson Bourne for CA Veracode, part of CA Technologies. This highlights organizations' lack of security awareness and puts organizations at risk of a breach ...

April 10, 2018

For a few years now, it has seemed like agile developers and DevOps teams haven't been giving testing its proper due. One could almost picture them thinking, "So what if there's a bug, design flaw or performance issue. We'll fix it in the new version next week." Of course, this line of thinking has turned out to be a big mistake ...

April 09, 2018

Government IT professionals surveyed, as part of F5 Networks' State of Application Delivery report, made it clear they are heavily focused on building the foundation necessary for application-driven digital transformation. Around the world, government organizations are shifting towards digital government, and with that we see government organizations embracing the cloud, adopting automation and orchestration, and adjusting security strategies ...

April 05, 2018

The digital war room — physical, virtual or hybrid — is not in retreat but in fact is growing in scope to include greater participation from development and security. It's also becoming more proactive, with on average more than 30% of "major incidents" before they impacted business service performance. In this blog I'm providing a few additional highlights from the insights we got on digital war room organization and processes ...

April 04, 2018

Many development organizations rely on DevOps, Agile and Continuous Integration/Continuous Delivery (CI/CD) practices and tools to speed up application delivery. However, shorter release cycles and faster application development also mean more frequent database schema and logic changes. Though the application release process has been fast-tracked through modernization and automation, the database deployment process has been forsaken ...

April 02, 2018

As March Madness is well underway, the journey to the NCAA basketball national championship feels much like the journey many organizations are on to achieve business success through digital transformation ...

Share this