The Imperative for Visibility into Cloud Native Web Services Traffic

June 22, 2020


Containers allow for organizations adopting the cloud to rapidly scale their operations to meet customer demand. But with speed comes security risks: the east-west traffic between microservices that power distributed modern applications can be susceptible to attacks just as north-south (client to app or API origin) traffic.

In this webinar, we’ll discuss why application layer protection is even more important with containerized apps and services using cloud-native technologies like Istio and Envoy. We’ll also demonstrate how to integrate and automate next-gen security protection to inspect east-west services traffic so DevSecOps teams can secure their applications without rapid iterations to release market-leading features. Attendees will learn:

Why cloud native is not just “lift and shift” and operating legacy apps in the cloud; How cloud-native applications using frameworks like Istio and Envoy Proxy differ from legacy applications;
How a next-gen WAF and RASP can provide visibility into east-west traffic to detect application layer attacks; How to embed next-gen WAF security in the CI/CD automation pipeline so DevOps teams can deliver features faster, with better security.

As Greenlight has containerized more of its apps, and as its customer base keeps growing, it’s had to confront the enviable growth challenges of scalability and security. Nearly 80% of its applications now run in Kubernetes, many on AWS EKS, and Greenlight needed security that could run at the same pace and scale. Join Greenlight’s senior DevOps engineer Ken De La Guera and architect Chris Byrd as they share insights on: the migration from EC2 to EKS, Greenlight’s role in the shared responsibility model, the top security use cases taking priority, how Greenlight is enabling DevSecOps to reduce friction.

Share some ❤
starts in 10 seconds