Aqua Security and IBM Team to Bring End-to-End Cloud Native Security to Power10-Based Systems

0
21
  • Aqua Security will provide new tools to help customers better secure the full lifecycle of Red Hat OpenShift-based containerized workloads on IBM Power servers
  • Customers can take advantage of the performance, scale, end-to-end security, and cost benefits delivered by Red Hat OpenShift infrastructure running on IBM Power10-based systems

Aqua Security has announced that the company will be the first cloud native security PartnerWorld partner supporting the launch of the new IBM Power10-based IBM Power E1080 server. Aqua Security will provide new tools to help customers better secure the full lifecycle of Red Hat OpenShift-based containerized workloads on IBM Power servers.

It said, “IBM Power10 is architected from the ground up to be one of the most secure server platforms, designed to protect data from on-premises to cloud with new security features including end-to-end memory encryption and accelerated cryptographic performance with 4 times the crypto engines per core compared with IBM Power9. Aqua Security builds on this strong base by leveraging Aqua’s unified, holistic platform to help customers mitigate the risks across the application lifecycle in hybrid cloud native environments by delivering consistent visibility, build and image security, Kubernetes container orchestration infrastructure protection as well as run-time policy enforcement. ”

Customers can take advantage of the performance, scale, end-to-end security, and cost benefits delivered by Red Hat OpenShift infrastructure running on IBM Power10-based systems. This can be done while addressing cloud native security and compliance concerns at scale with Aqua’s support for the new architecture and extended Power10 container and Kubernetes workload runtime protection capabilities for OpenShift.

Aqua’s embedded policies for cloud native workloads including VMs, containers and serverless functionsare designed to help Red Hat OpenShift on Power10 customers further integrate security and compliance requirements for application modernisation, whether they deploy their applications on-premises or in the public cloud.

LEAVE A REPLY

Please enter your comment!
Please enter your name here