Container scanning in cloud environments 

Container scanning in cloud environments

Share post

More security in cloud environments through container scanning. Sophos Cloud Optix now also identifies vulnerabilities in container images and enables automated reactions.

Sophos is expanding its cloud analysis solution, Sophos Cloud Optix, and offers additional security for container assets in multi-cloud environments with the ability to scan container images. With the new extension, potentially dangerous operating system weaknesses in container images can be identified and automatically remedied.

Increased demand for cloud services

Over the past year, the increased demand for cloud services has prompted many IT and security teams to accelerate their cloud migrations. In addition to an efficient and secure strategy for application provision in the cloud, companies must also pay attention to the sometimes complex configuration and the assignment of rights for access to the cloud infrastructure. This is the only way to use the cloud securely and avoid compliance problems. With Sophos Cloud Optix, companies and MSPs are able to monitor their cloud environments and at the same time initiate automated reactions to detected incidents.

Popular container

Containers are a scalable and portable cloud technology that is particularly useful for building, testing, and deploying applications in the cloud. It is used, for example, when developers want to move an application from a test environment to a production environment. This is largely done through publicly accessible container images, which are available to accelerate development work. Compared to virtual machines (VMs), containers don't run a full operating system. All the data needed to run the container is provided by the container image, so a single container can be used to run a single software process through to more complex applications.

Sophos Cloud Optix for more protection

Sophos Cloud Optix helps prevent security breaches by providing both visibility of container assets and scans to identify potentially exploitable vulnerabilities in container images. Container images can be scanned prior to deployment to prevent vulnerability threats. Newer image versions are also identified that have potential gateways for cyber criminals.

As soon as the container registrations are linked to Sophos Cloud Optix, the user receives details about the scans carried out, the images in the scan queue and the identified vulnerabilities. The image scan process is automatically repeated on a regular basis to identify vulnerabilities and available fixes for container images. Alerts can be sent directly to development teams via Jira, ServiceNow, Slack, and Microsoft Teams integrations to fix the issues.

Sophos Cloud Optix scans container images for security vulnerabilities

  • Amazon Elastic Container Registries (ECR)
  • Microsoft Azure Container Registrations (ACR)
  • Docker Hub Registrations
  • IaC environments (Bitbucket and GitHub)
  • Images in build pipelines (using the Cloud Optix API)

 

More at Barracuda.com

 


About Sophos

More than 100 million users in 150 countries trust Sophos. We offer the best protection against complex IT threats and data loss. Our comprehensive security solutions are easy to deploy, use and manage. They offer the lowest total cost of ownership in the industry. Sophos offers award-winning encryption solutions, security solutions for endpoints, networks, mobile devices, email and the web. In addition, there is support from SophosLabs, our worldwide network of our own analysis centers. The Sophos headquarters are in Boston, USA and Oxford, UK.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more