sb-nz logo
Story image

A10 aims to secure Kubernetes container environments

12 Dec 2018

A10 Networks a provider of intelligent and automated cybersecurity solutions announced the availability of the A10 Secure Service Mesh solution for applications deployed in open-source Kubernetes container environments. 

The solution aims to provide teams deploying microservices applications with an automated way to integrate enterprise-grade security and load-balancing with comprehensive application visibility and analytics.

“With the Secure Service Mesh solution, A10 continues to deliver on its promise of intelligent automation and security for both modern multi-cloud and traditional infrastructure,” said Lee Chen, CEO of A10 Networks. 

“Organisations are turning to containers for their production applications to become agile and scalable in meeting the demands of digital transformation. The A10 Secure Service Mesh is a significant advancement for these environments.”

A10 Lightning ADC, a containerised and lightweight load balancer and proxy, is the primary component providing load balancing and security capabilities. It works in an active-active cluster which is elastic and scales up/down automatically with the scale of a Kubernetes cluster. The same Lightning ADC cluster can be used for both North-South as well as East-West traffic.

The security solution between microservices includes enforcing micro-segmentation policies for traffic between the services. The system can also automatically encrypt traffic between services, further increasing the privacy and security of those communications. 

Additional security capabilities include rate-limiting application traffic to each service, application DDoS and SSL/TLS offload.

The Secure Services Mesh solution includes the A10 Harmony controller, which supposedly provides multi-cloud, centralised policy management and also comprehensive metrics, logs and analytics providing actionable insights for each microservice. 

These analytics include end-to-end transaction latency, throughput, request rate, and other real-time and historical metrics.

Traffic management capabilities in the A10 Secure Services Mesh include automatic service discovery, health monitoring, load balancing, URL/content switching, and support for Blue-Green or Canary deployments.

Supposedly none of these capabilities requires any change to the actual applications and can be completely automated under the control of the operations teams. 

This lowers the operational burden as the microservices applications scale in usage and complexity. The A10 Secure Services Mesh solution is integrated with container management systems like Kubernetes and Red Hat OpenShift.

A10 Networks VP Kamal Anand says, “For applications deployed in a Kubernetes environment, east-west traffic security is a prime concern.

“The A10 Secure Service Mesh elegantly addresses security concerns without imposing any specific deployment model or requiring any changes to applications." 

"Per-service, application-layer traffic analytics greatly help operations teams to optimise the application as well as infrastructure and enhance the security and delivery of their application.”

Story image
Education sector most at risk of DNS attacks - with a steep cost
84% of education organisations surveyed have been hit by DNS attacks, with each suffering an average of eight attacks.More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
Women in cybersecurity – what is holding us back?
A robust and diverse workforce with wide-ranging skills and depth of experience is essential for providing balance, safety and continuity to both the industry and countries at large. More
Story image
Businesses left to make decisions based on old, inaccurate data, study finds
"It is more critical than ever that organisations have access to actionable, contextualised, near real-time threat data to power the network and application security tools they use to detect and block malicious actors."More
Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More
Story image
Protegrity rolls out updates to data protection platform
Protegrity has updated its Protegrity Data Protection Platform to better secure sensitive data in hybrid-cloud, multi-cloud and SaaS environments.More