Subscribe To Our Daily Enewsletter:

Qualys Adds Runtime Protection to Container Security Platform

Qualys, an information security and compliance solutions provider, has unveiled Container Runtime Security for its Container Security platform.

Container Runtime Security provides real-time container file-access monitoring and blocking, network micro-segmentation, vulnerability and exploit mitigation and virtual patching, according to Qualys. It enables security teams to implement a container security program that includes vulnerability management and detection and response across the build-ship-run container pipeline.

How Does Container Runtime Security Work?

Security teams can use Container Runtime Security to monitor and block container runtime behaviors, including file access, network communications and process behaviors, Qualys said. They can create custom behavioral policies, use policies from a built-in policy library or automatically generate policies based on learned container behaviors as well.

In addition, Container Runtime Security allows security teams to deliver standardized, guaranteed container runtime security across Docker, Kubernetes and other container environments, Qualys indicated. Container Runtime Security also can be used in Azure Container Instances, Amazon Web Services (AWS) Fargate, Google CloudRun and other container-as-a-service environments.

Qualys Bolsters Its Cybersecurity Portfolio

Along with its Container Runtime Security announcement, Qualys recently has made several moves to enhance its cybersecurity portfolio.

Qualys in July added Ivanti patch management capabilities to its Vulnerability Management Detection Response (VMDR) platform, so users can patch Apple macOS systems and over 70 third-party Mac applications. The company also acquired endpoint detection and response (EDR) platform provider Spell Security.

Global organizations use the Qualys Cloud Platform to maintain visibility on-premises and across their endpoints, clouds, containers and mobile environments. Furthermore, they leverage the platform to automate IT system and web application auditing, compliance and protection.

Return Home

No Comments

Leave a Reply

Your email address will not be published. Required fields are marked *