Moving from VMs to Container Orchestration
Modern enterprise network environments are increasingly transforming to be cloud-based, where both applications and data storage are hosted in a cloud—and often multi-cloud—environment. The attack surfaces and security protection requirements of software in distributed cloud environments are vastly different from those in traditional network architectures, where applications and data are hosted on enterprise-owned servers in on-premise data centers.
Along with the business environment transformation, there is a parallel trend in the modernization of software development processes and environments. Applications have evolved from single-server software installs, to virtual machine (VM) server-independent environments, and more recently, to container-based technology. In these modern cloud-native, container-based architectures, the security mechanisms and protections for your business applications must evolve in line with software development methods and tools, as well as with the threats that exist during deployment, orchestration and day-to-day operation.