2022-06-23T13:53:00Z

What container security solution are you using?

Do you recommend it?

DG
Tech blogger
  • 3
  • 47
2
PeerSpot user
2 Answers
Deena Nouril - PeerSpot reviewer
Tech Blogger
Real User
Top 5
2022-07-05T12:48:29Z
Jul 5, 2022

I am currently using Snyk. Here's what I like about it:

I feel Snyk is one of the top container security solutions that’s available on the market. Out of all the solutions I have tried, it has been the best for integrating with other security solutions. Snyk enables users to combine its already existing security features with those of other solutions to create far more robust and flexible layers of security than what it can supply on its own. It also gives users the ability to dig into all of the security issues that they may experience.


Snyk enables me to be a secure developer. Although open source can help to improve our productivity, using other people’s code without vetting it for security can place our apps at risk. Snyk empowers us to detect and correct known weak links in our open source. This platform proactively and seamlessly finds and resolves license violations and vulnerabilities in Docker images and open source dependencies.


Some of Snyk’s greatest benefits include:




  • Highly flexible: Snyk enables users to customize the system’s security automation features to meet their needs. Users can guarantee that the automation performs the functions that are most essential for their current project. Additionally, users are able to maintain platform governance consistency across their system.


  • Conserves resources: Snyk easily integrates with other security solutions and uses their security features to ensure that the work that users are doing is completely secure. These integrations allow them to protect themselves without pulling resources from their continued integration or continued delivery workflows. Resources can be conserved for areas of the greatest need.



  • Keeps users ahead of emerging threats. Snyk employs a database of threats that help it detect and keep track of potential issues. This database is constantly being updated to reflect the changes that take place in the realm of cybersecurity. It also uses machine learning. Users are prepared to deal with new issues as they arise.


  • Automatically scans projects for threats. Snyk’s command-line interface enables users to schedule the solution to run automatic scans of their projects. Time and manpower can be conserved for the areas of greatest need without sacrificing security.

In addition to Snyk’s many advantages, some of the solution’s powerful features I like most include:



  • Code security

  • Security posture management

  • Workload protection

  • Network security

  • Identity security

  • Patch management

  • Vulnerability scanning and assessment

  • Policy management

  • Asset discovery and tagging

  • Risk management

  • Prioritization


Since I started using Snyk, I’ve been very satisfied.


I have also tried Prisma Cloud by Palo Alto Networks and this is what I liked about it:


The move to the cloud has changed all aspects of the application development lifecycle, with security being foremost among them. Prisma Cloud delivers complete security and compliance coverage across the development lifecycle on any cloud environment, enabling us to develop cloud-native applications with confidence. Prisma Cloud safeguards our cloud operations across hybrid and multi-cloud environments, all from a single, unified solution, using a combination of cloud service provider APIs and a unified agent framework.


What impresses me most about Prisma Cloud is its visibility into workloads. This has enabled us to take a very strong preventive approach to cloud security. We’re able to set up policies to alert on risky behavior.


When working with Prisma Cloud, I found these benefits especially suitable to my needs:




  • High-speed onboarding: Within seconds, multiple cloud accounts and users can be onboarded, quickly enabling integrated security capabilities.


  • Multiple integration options: Prisma Cloud can integrate with popular IDE, SCM, and CI/CD processes early in the development process, allowing users to find and address vulnerabilities and compliance problems before they enter into production. Prisma Cloud fully supports all major workflows, automation frameworks, and third-party applications.


  • Unified management: Because all users use the same dashboards created through shared onboarding, cloud security can be managed by a single agent framework.


The Prisma Cloud features I like most include:



  • Code security

  • Security posture management

  • Workload protection

  • Network security

  • Identity security

Search for a product comparison in Container Security
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Real User
ExpertModerator
2022-06-25T04:51:38Z
Jun 25, 2022

Hi @Dovid Gelber ​,


Few point that will help select a container security solution for any business



  • Consider the entire ecosystem. Securing each container and its image is critical, but don’t ignore the rest of the container ecosystem. The orchestration platform, cloud environment, and container host all represent attractive vectors for threat actors.

  • Ignoring automation as a fundamental requirement. Security automation should be a mandatory capability for quickly protecting and updating containers across the entire environment whenever new risks are identified.

  • Runtime threat protection, detection and response are vital for container environments as zero-days continue to evolve into more elusive and persistent threats.

  • Can I cover the entire application lifecycle? Containers need to be secured from the very beginning of development, through testing, and into deployment (where enterprise applications are most vulnerable without thorough security).

  • Can I stand up to stringent compliance mandates? Continually meeting the data security requirements laid out by PCI, GDPR, HIPAA and other government and industry regulations necessitates a solution strategy that can ensure security policy enforcement and provide sufficient compliance reporting.

  • Can I stop unknown vulnerabilities? Known threats are one thing, but any container security strategy must also be able to protect sensitive data from zero day attacks, insider threats, and any vulnerabilities that don’t yet have a patch available.

  • Will I slow down development? Automated container security processes and policies are a crucial part of any container solution strategy. Security is critical, but cannot slow down application development.


Let me know your view and feedback.

DG
Tech blogger
Real User
Top 5
Jun 25, 2022

@Shibu Babuchandran These are interesting points to consider.

PeerSpot user
Learn what your peers think about Aqua Cloud Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: September 2023.
734,678 professionals have used our research since 2012.
Related Questions
Avigayil Henderson - PeerSpot reviewer
Content Development Manager at PeerSpot
Jul 10, 2023
Hi community, Why is Container Security software important for companies? Share your thoughts with the rest of the community.
See 1 answer
Avigayil Henderson - PeerSpot reviewer
Content Development Manager at PeerSpot
Jul 10, 2023
Container Security Software is important for companies because it helps protect their containerized applications and infrastructure from potential security threats.-It provides enhanced security measures specifically designed for container environments.-It helps identify vulnerabilities and potential risks in container images and configurations.-It enables companies to enforce security policies and best practices across their containerized applications.-It helps detect and prevent unauthorized access or malicious activities within containers.-It offers real-time monitoring and alerting capabilities to quickly respond to security incidents.-It ensures compliance with industry regulations and standards.-It helps companies maintain the integrity and confidentiality of their data within containers.-It allows for secure container image scanning and verification before deployment.-It helps companies mitigate the risks associated with container vulnerabilities and exploits.-It provides visibility into container activities and helps companies gain insights into potential security gaps.
Avigayil Henderson - PeerSpot reviewer
Content Development Manager at PeerSpot
Feb 19, 2023
Hi community,  Please share your input and help out fellow peers. Thank you.
See 1 answer
LW
Content Editor at PeerSpot
Feb 19, 2023
This is a pretty broad question that covers a number of application levels and environments so there isn't necessarily a one-size-fits-all answer. (Then again, when it comes to app security, there probably never is). The definite starting point is static code analysis or application security software tools to scan your source code for potential security vulnerabilities and provide feedback on how to remediate them. They can be integrated into your development pipeline to catch issues early in the process, both enforcing and validating policies that you configure. Infrastructure as code tools (Red Hat Enterprise Linux, HashiCorp Terraform, for example) enable you to define your infrastructure in code and manage it through version control. That way, you validate that your infrastructure meets security requirements before it is deployed and ensure that changes to the infrastructure are properly audited. Another (likely) necessity on the cloud side is a cloud security posture management (CSPM) tool to monitor your cloud infrastructure for security risks and provide recommendations for remediation. If your environment includes containerization, container security tools scan your container images for vulnerabilities and provide recommendations for fixes. Integrating container security tools into your CI/CD pipeline can help ensure your containers are secure before they are deployed. Basically, you're going to need tools at each level if you're going to validate and enforce app security requirements consistently and reliably, and if you have any thoughts of scaling things.
Related Articles
NC
Content Manager at PeerSpot (formerly IT Central Station)
Apr 25, 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for the Top 8 Container Security Tools to help y...
Related Categories
Related Articles
NC
Content Manager at PeerSpot (formerly IT Central Station)
Apr 25, 2022
Top 6 Container Security Tools 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to...
Download Free Report
Download our free Aqua Cloud Security Platform Report and get advice and tips from experienced pros sharing their opinions. Updated: September 2023.
DOWNLOAD NOW
734,678 professionals have used our research since 2012.