Tigera Secure enables a workload to workload Zero Trust model that protects modern business applications and extends through the rest of the legacy applications to provide a stronger security posture across the enterprise. It enforces security around each workload; whether running on a Container, VM or Host. No traffic is trusted, and all traffic is verified via service-to-service authentication that is executed via encrypted channels.
Tigera Secure integrates with your existing environment, tools, and SOC. It applies security policy that provides anomaly detection and traffic visibility that help detect and fight threats. It automates audit reports that enable proof to auditors seeking evidence to assure your compliance controls are established and working.
Zero Trust Network Security
Tigera Secure provides fine-grained segmentation designed for modern dynamic workloads while also supporting traditional host and VM environments. Certificate-based authentication, authorization, and encryption can be applied to each workload with no code changes required, and then security policies are monitored for anomaly detection.
Tigera Secure security policies can be defined in the GUI. They can also be defined with developer-friendly configuration files that provide security automation throughout you DevOps CI/CD.
Visibility, Traceability and Remediation for Dynamic Applications
Tigera Secure logs network flows for all service-to-service communication within microservices and other dynamic applications. Flow logs are appended with the workload identity and other labels & metadata, enabling accurate visibility into the communication between short-lived ephemeral workloads.
Tigera Secure monitors flow logs for security policy violations as well as other anomalies. It can be configured to automatically quarantine anomalous workloads and send an alert for further inspection.
Tigera Secure empowers businesses to detect threats, perform forensic investigations, and identify operational issues within increasingly large sets of Kubernetes network flow logs.
Continuous Compliance & Enterprise Controls
Tigera Secure logs data that you need in order to prove compliance with security controls. Security policies define the rules for your environment and an audit log tracks their change history. Paired with accurate network flow logs, you can demonstrate to auditors that your security controls have been enforced.
Tigera Secure enables collaboration between security, network, platform, and application teams using a tiered security policy model. Each team is a involved in securing the environment, however each have a different context. Tigera Secure uses a tiered approach that enables teams to execute without introducing dependencies on each other.
Security that Spans Multi-Cloud and Legacy Environments
Tigera Secure enables a unified security policy that spans multiple clouds, locations, orchestrators, and traditional VM and Host based environments. Workload identities are federated across each cloud and on-premises environment, enabling consistent enforcement of workloads and the flexibility to move workloads without the need to redefine your security policies.