1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

What’s inside your containers? Why visibility and control are critical for container security

Discussion in 'Network World' started by RSS, Oct 15, 2015.

  1. RSS

    RSS New Member Member

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

    As organizations turn to containers to improve application delivery and agility, the security ramifications of the containers and their contents are coming under increased scrutiny.

    Container providers Docker, Red Hat and others are moving aggressively to reassure the marketplace about container security. In August Docker delivered Docker Content Trust as part of the Docker 1.8 release. It uses encryption to secure the code and software versions running in Docker users’ software infrastructures. The idea is to protect Docker users from malicious backdoors included in shared application images and other potential security threats.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page