Public Cloud Security

Use Case: Container Security

web product icon public cloud

Enabling Holistic Container Security

Container technology enables developers with new ways to design and develop applications in a more modular and resilient manner. This is accomplished by separating different logical functions of applications into separate containers for reasons of code life-cycle management and scalability. Further, by breaking applications out into different logical functions—namely, microservices—container technology enables enhanced portability of microservices and applications across different public and private cloud environments.

The Fortinet container security strategy offers multiple solutions that address the entire life cycle of container-based applications:

  • Container-aware security with the FortiGate Cloud Connector enables awareness of container labels when defining security policies.
  • Container-enabled security with FortiWeb as a container image can be bundled within an application chain.
  • Container-integrated security allows a Fortinet solution to be dynamically integrated into Kubernetes clusters and inserted in the application chain.
  • Container registry security with FortiSandbox scans pulled, pre-configured container images for zero-day threats.

Together they provide comprehensive protection against threats associated with the different threat vectors to which container-based applications are exposed. Learn more.

 

Protecting application containers throughout the application life cycle

 

 

Protecting application containers throughout the application life cycle

 

 

Featured Products

FortiGate

FortiWeb

FortiSandbox

Related Resources

Securing Web Applications in Container-based Environments

Securing Web Applications in Container-based Environments

Out-of-the-box security for containerized DevOps.

Читать сейчас
Fortinet Container Security

Fortinet Container Security

Security for the entire application container life cycle with Fortinet.

Читать сейчас
Key Principles and Strategies for Securing the Enterprise Cloud

Key Principles and Strategies for Securing the Enterprise Cloud

A cloud security blueprint for multi-cloud environments.

Читать сейчас