Q1. What do organizations need to know about container security? What are some of the unique security challenges posed by the deployment of containers and container orchestration tools across hybrid environments?
Containers' inherent benefits help development and operations teams efficiently develop and deploy new applications for the business much faster, simplifying the DevOps model. However, the accelerated pace of development made possible with containerized applications means they are often developed and deployed insecurely, requiring CISOs and security teams to rethink how security gets embedded into the process. Container security needs to be agile and automated so it doesn't impede the development process.
In order to securely embrace the container movement, organizations must be able to do four things well. First, they must discover and track container environments across their sprawl and scale. Second, they need effective vulnerability management, compliance practices, and container-native intrusion detection/prevention. Thirdly, in order to achieve collaboration across security and DevOps teams, organizations also must have adaptive security frameworks that integrate into the DevOps practices and the CI/CD toolchain. Lastly, it is also important for organizations to update operational monitoring, rethink their patch and release strategy and overhaul their approach to incident response.
Along the way, there are several major threat vectors involved in the deployment of containers, which pose their own security challenges, and which security teams must keep on their radar as they deploy containers and orchestration tools.
First, the presence within container images of un-validated external software that has been downloaded from untrusted sources poses a challenge for security teams to effectively assess and manage the image integrity of containers which have not been curated by the enterprise.
Second, containers may have unstandardized configurations & deployment hygiene, which exposes IT environments to higher risks of breaches and potential loss of sensitive information.
Thirdly, security teams may also be challenged to monitor container-to-container communication (East-West traffic) via an exposed port, which bypasses regular host-based monitoring options and inhibits checks for lateral movement and breaches.
Finally, the ephemeral nature of containers can pose a challenge for security teams. Containers are intended to constantly spawn and disappear in keeping with the elastic demand of customer environments, requiring security to be more dynamic than ever before. This can lead to a lack of better governance and potential unauthorized access.
Q2. What specific business issue or security issue is Qualys helping organizations address with its recently launched Asset Inventory cloud app?
Digital transformation and the ever-evolving cybersecurity threat landscape are introducing new technology at increasing variety, scale and speed. Simultaneously, teams are trying to manage these resources across siloed security solutions and budget constraints. Asset Inventory helps Qualys customers tackle these challenges by delivering an automated, unified solution and a single source of truth for asset data that allows better interchange between the CIO and CISO to improve IT, and enables better collaboration and strategic planning across IT and Infosec.
Qualys Asset Inventory leverages Qualys sensors including network scanners and Cloud Agents to discover all assets across global hybrid infrastructure whether it has been acquired through typical or unofficial channels such as M&A or such as employee credit card purchase, then normalizes and categorizes the information gathered for each hardware and software asset, providing customers unprecedented level of granular visibility, detail and organization for IT assets spread across on-premises, endpoints, clouds and mobile.
By delivering customers consistent and uniform it asset data, Asset Inventory helps them overcome the essential labor, time and cost challenges of gaining initial inventory clarity and accuracy. It standardizes every manufacturer name, product name, model and software version by automatically normalizing raw discovery data to Qualys' ever-evolving technology catalog, saving teams the time and effort of cleaning up and massaging that data.
This ability to work with complete, clean and organized data frees up those teams resources so they can spend time making better business decisions. For instance, teams can more quickly and easily detect a variety of issues, such as unauthorized software, outdated hardware or end-of-life software, which can help them properly operationalize security across the organization, support and secure critical assets powering today's digital transformation efforts.
Q3. What can attendees at Black Hat USA 2018 expect to see and hear from Qualys at the event? What is your company's big push going to be at Black Hat?
At Black Hat USA 2018, Qualys will showcase recent enhancements we have made to our cloud platform that are helping our customers unify all the necessary security and compliance detection, prevention and response capabilities required to organically build security into the new, hybrid IT infrastructure.
Digital transformation today is enabling significant changes in the way IT infrastructure is being developed and deployed — very quickly and at new scale. We realize that in order to keep pace with these changes, organizations must re-factor and simplify security by eliminating friction and making it as intuitive and automated as possible. This is why a main focus of our presence at Black Hat will be on helping our customers bring security and IT closer together by delivering increased visibility, accuracy, scale, immediacy and Transparent Orchestration of their security programs.
At Black Hat, we'll also be talking about how the latest Qualys Cloud Platform enhancements uniquely help organizations bring the capabilities of DevOps and SecOps together into a single view, integrating security and compliance visibility into the DevOps pipelines where digital transformation projects are built and deployed. This gives them a better ability to protect the entire DevSecOps lifecycle, from the development to the production stages.
Finally, we'll be discussing how CIOs and CISOs can avoid accumulating disparate, point solutions that are costly to manage, difficult to integrate, and ultimately ineffective at protecting hybrid IT environments, and will be showcasing the full breadth of security and compliance Cloud Apps that the Qualys Cloud Platform consolidates, along with how our customers are leveraging this unified platform today to drastically reduce their IT security spend.