Logz.io announced the addition of critical security scanning to its Kubernetes 360 unified observability interface.
Integrating key security and compliance context into Kubernetes 360 directly enables today’s monitoring and observability teams to quickly identify critical vulnerabilities present in their applications and infrastructure to inform related remediation.
Based on a integration with the Aqua Trivy open source vulnerability and misconfiguration scanning solution, the advancement empowers Logz.io Open 360™ platform users to quickly identify and resolve security issues introduced to their Kubernetes environments. Trivy specifically scans for problematic open source software packages and dependencies, infrastructure as code issues and misconfigurations, and Common Vulnerabilities and Exposures.
Introduced in late 2022, Logz.io’s Kubernetes 360 is purpose-built to unify all the observability data needed by today’s teams tasked with ensuring optimization of complex, fast moving Kuberenetes systems.
“Kubernetes has become the de facto operating system for applications-driven organizations, and this is driving the rapid convergence of security and observability data,” said Asaf Yigal, CTO and co-founder of Logz.io. “As a result, organizations need baked-in security monitoring and response for Kubernetes environments, and with this added content, Kubernetes 360 further provides everything teams need to monitor their environments in a single interface.”
Injecting critical security and compliance details into Kubernetes 360 represents the next step in Logz.io’s strategy of enabling Open 360 with the simple, unified and cost effective capabilities that today’s fast growth software organizations need to optimize their observability practices and budgets. Whether acting quickly to remediate vulnerabilities and configurations themselves, or in partnership with full-time security teams, adding security and compliance content to Kubernetes 360 will further accelerate customers’ DevOps and CI/CD practices through a single source of analysis and visualization.
The addition of Aqua Trivy monitoring intelligence into Kubernetes 360 also represents Logz.io’s continued work to leverage a broad range of expanded integrations to enable a more capable solution.
In addition to detailed security content for Kubernetes 360 users, the Open 360 platform includes the Logz.io Cloud SIEM, providing advanced threat detection and response for dedicated security analyst teams and DevSecOps practitioners. Used in combination, the platform now provides far reaching capabilities for integrated security investigation and response – spanning from software engineering through the SOC, and beyond.
The Latest
Developers need a tool that can be portable and vendor agnostic, given the advent of microservices. It may be clear an issue is occurring; what may not be clear is if it's part of a distributed system or the app itself. Enter OpenTelemetry, commonly referred to as OTel, an open-source framework that provides a standardized way of collecting and exporting telemetry data (logs, metrics, and traces) from cloud-native software ...
As SLOs grow in popularity their usage is becoming more mature. For example, 82% of respondents intend to increase their use of SLOs, and 96% have mapped SLOs directly to their business operations or already have a plan to, according to The State of Service Level Objectives 2023 from Nobl9 ...
Observability has matured beyond its early adopter position and is now foundational for modern enterprises to achieve full visibility into today's complex technology environments, according to The State of Observability 2023, a report released by Splunk in collaboration with Enterprise Strategy Group ...
Before network engineers even begin the automation process, they tend to start with preconceived notions that oftentimes, if acted upon, can hinder the process. To prevent that from happening, it's important to identify and dispel a few common misconceptions currently out there and how networking teams can overcome them. So, let's address the three most common network automation myths ...
Many IT organizations apply AI/ML and AIOps technology across domains, correlating insights from the various layers of IT infrastructure and operations. However, Enterprise Management Associates (EMA) has observed significant interest in applying these AI technologies narrowly to network management, according to a new research report, titled AI-Driven Networks: Leveling Up Network Management with AI/ML and AIOps ...
When it comes to system outages, AIOps solutions with the right foundation can help reduce the blame game so the right teams can spend valuable time restoring the impacted services rather than improving their MTTI score (mean time to innocence). In fact, much of today's innovation around ChatGPT-style algorithms can be used to significantly improve the triage process and user experience ...
Gartner identified the top 10 data and analytics (D&A) trends for 2023 that can guide D&A leaders to create new sources of value by anticipating change and transforming extreme uncertainty into new business opportunities ...
The only way for companies to stay competitive is to modernize applications, yet there's no denying that bringing apps into the modern era can be challenging ... Let's look at a few ways to modernize applications and consider what new obstacles and opportunities 2023 presents ...
As online penetration grows, retailers' profits are shrinking — with the cost of serving customers anytime, anywhere, at any speed not bringing in enough topline growth to best monetize even existing investments in technology, systems, infrastructure, and people, let alone new investments, according to Digital-First Retail: Turning Profit Destruction into Customer and Shareholder Value, a new report from AlixPartners and World Retail Congress ...