Is your container security good enough? (Image Credit: Pete Linforth from Pixabay)The explosion of containers has changed the IT landscape. The speed with which thousands of instances can be deployed is a major boost for scale-up businesses. However, it comes with a downside. That ability to orchestrate the mass deployment of containers can be a nightmare if any of those containers are infected with malware.

Enterprise Times talked to Sumedh Thakar, President and Chief Product Officer for Qualys, about container security. Thakar says: “One of the biggest advantages that we have with container security is the ability to really to embed the security right in from the beginning of the cycle.”

Sumedh Thakar, President and Chief Product Officer, Qualys (Image Credit: Qualys)
Sumedh Thakar, President and Chief Product Officer, Qualys

One way to do that is to move security into the container framework. Another is to take advantage of the CI/CD pipelines and build security into the process. Thakar believes this is: “A lot less risky to do compared to deploying tools in the production environment.”

Building it into the pipeline also means a change to patching. It allows the core containers image to be maintained and patched quickly. The result, says Thakar is: “Because now you can just patch the image, create a new image, spin up new containers, spin down the old ones, and you’re patched. That is the first thing that customers are focusing on when it comes to containers right now.”

To hear what else Thakar had to say, listen to the Podcast.

Where can I get it?

You can listen to the podcast by clicking on the player below. Alternatively, click on any of the podcast services below and go to the Enterprise Times podcast page on these platforms.

Enterprise Times on Spotify (Image Credit: Spotify)

Enterprise Times on Soundcloud (Image Credit: Soundcloud)

Enterprise Times on Google Podcasts (Image Credit: Google)

Enterprise Times on Stitcher (Image Credit: Stitcher)

Enterprise Times on Podchaser (Image Credit: Podchaser)


Please enter your comment!
Please enter your name here