Security News > 2021 > March > Aqua Security cloud native security platform protects high-density workloads on Arm-based infrastructure
Aqua Security announced that its cloud native security platform now protects containers and Virtual Machine workloads at runtime on Arm-powered devices.
This enables Aqua customers to take advantage of the high density and cost-effectiveness provided by Arm-powered hosts and devices across cloud infrastructure, edge and IoT platforms, including the new AWS Graviton2 instances from Amazon Web Services.
As the number of Arm-powered services in the cloud native and IoT compute spaces increases, Aqua customers will enjoy continued choice for optimizing the cost and performance of their cloud native applications, while enjoying unified, consistent security across all architectures.
"Our collaboration with Aqua ensures broader security support for a wide range of Arm-based infrastructure solutions from the cloud to the edge."
The Aqua Cloud Native Security Platform provides a complete solution to secure cloud native application, from the build phase, through to protecting the infrastructure they run on, to runtime protection of workloads in production.
"Through our commitment to supporting the full range of cloud native deployment options, Aqua has collaborated with Arm and AWS to afford our shared customers the freedom of choosing innovative cloud native architectures and propel better efficiencies and scale, while enforcing security policies and adhering to compliance mandates," says Amir Jerbi, Aqua's Co-founder and CTO..
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/u0yjr8DuZaw/
Related news
- Leveraging AI and automation for enhanced cloud communication security (source)
- Email security trends in the energy and infrastructure sector (source)
- Reducing the cloud security overhead (source)
- Harnessing the Power of CTEM for Cloud Security (source)
- Google Cloud/Cloud Security Alliance Report: IT and Security Pros Are ‘Cautiously Optimistic’ About AI (source)
- Exposing the top cloud security threats (source)
- Breakthrough in Quantum Cloud Computing Ensures its Security and Privacy (source)
- Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity (source)
- The first steps of establishing your cloud security strategy (source)
- eBook: Cloud security skills (source)