Sponsored By: Pulse Secure
The growth in popularity of containers and microservices is serving up significant challenges to developers and IT departments. As the speed of deployment and changes to what is in the field increases, new approaches to the arc of development, deployment, monitoring, and upgrading are required.
The changes developers and IT department are facing go beyond new technologies. Experts add that the human element is key for success in this new environment, along with tools to automate and ease the process.
At the same time, companies are now tasked with maintaining network security while deploying containers at scale, a far more complex environment than legacy ones.
In early January, Tripwire released a survey of 311 IT security professionals who work at companies with more than 100 employees and have containers in their environments. “The State of the Container Report” found that 86 percent had containers in production.
Sixty percent of companies responding, including 75 percent of those with more than 100 containers in production, had security incidents. Ninety-four percent said that they have concerns about container security. Seventy-one percent expect container security concerns to increase this year.
The fact is that many containerized environments are not, or not trusted to be, secure. However, as containers evolve they may end up creating a more secure environment than existing ones.
This eBrief takes a look at what is being done to alleviate the challenges of moving applications to container architectures. It will start with a look into the human element and the changing stakeholders as a result of containerized environments.