Report cover image

Kubernetes Security: K8s Is Both the Problem and the Solution

Publisher IDC
Published Feb 10, 2023
Length 14 Pages
SKU # IDC17718056

Description

Kubernetes Security: K8s Is Both the Problem and the Solution

This IDC Perspective provides an in-depth review of Kubernetes security. Securing a Kubernetes environment is not like securing a virtualized collection of servers and applications. Kubernetes totally changes the rules of the software code protections game as applications move from monolithic to microservices based, linking hundreds or even thousands of loosely coupled services that are dynamic, ephemeral, and highly distributed, often with the support of third-party applications that have their own vulnerabilities and maintenance challenges. Building security into applications is now the model for modern application development and requires a "shift left" approach."The uniqueness of Kubernetes has customers demanding more comprehensive solutions. Bolt-on, after-the-fact security solutions are things of the past and just will not work. Modern application development requires the ability to build security into applications. Security should be viewed as a continuous process rather than products." — Frank Dickson, group vice president, Security and Trust at IDC.

Please Note: Extended description available upon request.

Table of Contents

14 Pages
Executive Snapshot
Situation Overview
Advice for the Technology Buyer
Considering K8s Security Solutions
Visibility
Analytics
Cloud Security Posture Management Personas
Response and Remediation
Vendors to Consider
Aqua Security
Check Point
CrowdStrike
Microsoft
Palo Alto Networks
Sysdig
Trellix
Trend Micro
VMware/Broadcom
Guidance for the CIO
Learn More
Related Research
Synopsis
How Do Licenses Work?
Head shot

Questions or Comments?

Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.