Tigera
  • Products
    • Calico Products
    • Calico Enterprise
    • Calico Essentials
    • Project Calico
    • Calico for Windows
  • Use Cases
    • Egress Access Controls
    • Observability and Troubleshooting
    • Enterprise Security Controls
    • Extend Firewalls to Kubernetes
    • Zero Trust Network Security
    • Intrusion Detection
    • Cloud Microsegmentation
    • Self Service Network Security Changes
    • Multi-Cluster Networking, Security, Observability
  • Resources
    • Resource Center
    • Free Training Resources
    • Get Calico Certified
    • Training
    • Newsroom
  • Blog
  • Contact Us
  • Try Now
Select Page
The Myth of a Single Container Security Solution

The Myth of a Single Container Security Solution

by Christopher Liljenstolpe | Mar 20, 2019 | Containers, Security

A proper container security strategy involves evaluating all components in the system. Thoughts from 35,000 feet Two experiences in the last 24 hours have encouraged me to write this missive. At least it seems like a good idea while sitting in a sealed Aluminium tube...
Using Kubernetes Labels for Analytics, Forensics and Diagnostics

Using Kubernetes Labels for Analytics, Forensics and Diagnostics

by Christopher Liljenstolpe | Mar 6, 2019 | Blog, Kubernetes, Network Policy

Usually, when you hear us going on about labels here at Tigera, we are mentioning them as targets for selectors for network policies.  As a review, you might have a policy that says, “things labeled customerDB=server should allow traffic on 6443 from things labeled...
Leveraging Service Accounts for Label-based Security

Leveraging Service Accounts for Label-based Security

by Christopher Liljenstolpe | Jan 31, 2019 | Blog, Kubernetes, Security, Uncategorized

One of the key Kubernetes security concepts is that workload identity is tied back to information that the orchestrator has. The orchestrator is actually the authoritative entity for what the actual workloads are in the platform. Kubernetes uses labels to select...
Introduce Your Kubernetes Services to the World

Introduce Your Kubernetes Services to the World

by Christopher Liljenstolpe | Dec 27, 2018 | Kubernetes, Networking

How to connect Kubernetes pods to on-premises infrastructure Unless you’ve been living under a rock for the last few years, you probably know that Tigera’s Project Calico and Tigera’s Secure Enterprise Edition use BGP to connect the pods in your on-prem Kubernetes...
Adventures in Partitioning

Adventures in Partitioning

by Christopher Liljenstolpe | Dec 11, 2018 | Business Strategy, Kubernetes, Microsegmentation, Network Policy, Security, Zerotrust

Or, How to map my current operational model into the brave new Kubernetes world Recently, I was working with a large customer of ours as part of an engagement to help them work through their security posture for their Kubernetes environment(s). As with most large...
« Older Entries
  • Products

  • Calico Products
  • Calico Enterprise
  • Calico Essentials
  • Project Calico
  • Calico for Windows
  • Use Cases

  • Egress Access Controls
  • Observability and Troubleshooting
  • Enterprise Security Controls
  • Extend Firewalls to Kubernetes
  • Zero Trust Network Security
  • Intrusion Detection
  • Cloud Microsegmentation
  • Self Service Network Security Changes
  • Multi-Cluster Networking, Security, Observability
  • Resources

  • Resource Center
  • Free Training Resources
  • Get Calico Certified
  • Newsroom
  • Tigera Blog
  • Services

  • Support Portal
  • Training
  • Company

  • Partners
  • Careers
  • Leadership
  • Contact Us
Tigera: Extend Firewalls to Kubernetes

Copyright © Tigera, Inc. All rights reserved | Privacy Center | Do Not Sell My Information | Legal

X

Special 🎉 announcement coming.Join us on Feb 16 @ 10am for an exclusive new product offering event.Learn more >>>