Introducing: Application Layer Policy
Security is a moving target. Each year we see more sophisticated attacks and ever larger scale breaches. At the same time, enterprises are calling for more deployment flexibility—across availability zones …
Security is a moving target. Each year we see more sophisticated attacks and ever larger scale breaches. At the same time, enterprises are calling for more deployment flexibility—across availability zones …
This is the final installment of our series on Using Network Policy in concert with Istio. It is also the most speculative because I’ll be discussing where we think open …
Using Network Policy in Concert with Istio Part 3 Read More »
Welcome to Part 2 of our series on using Network Policy in concert with Istio. In this installment we will recommend what policy controls to put in place if you …
Using Network Policy in Concert with Istio Part 2 Read More »
So, let’s say you have heard great things about a service mesh and are excited about the Istio open source project. Maybe you’ve even decided to move your application (or part …
Today, we were excited to be part of the launch of a new Kubernetes networking project, Istio. Together with Google, IBM and Lyft, we on the Project Calico team at …
Welcoming Istio to the Kubernetes networking community Read More »
|