SHARE
Facebook X Pinterest WhatsApp

Illumio Secures Docker Container and DCOS Environments

The Five Dos and Don’ts of Virtualization As is often the case when it comes to deploying emerging technologies in enterprise IT environments, the level of security available to make sure those technologies don’t wind up creating new pathways for malware can be a showstopper. Nowhere has that been more apparent than in the security […]

Written By
MV
Mike Vizard
Sep 30, 2015
Slide Show

The Five Dos and Don’ts of Virtualization

As is often the case when it comes to deploying emerging technologies in enterprise IT environments, the level of security available to make sure those technologies don’t wind up creating new pathways for malware can be a showstopper. Nowhere has that been more apparent than in the security debate surrounding Docker containers.

To make it possible for IT organizations to make use of Docker containers and platforms such as the Mesosphere Data Center Operating System (DCOS), Illumio today announced that its Adaptive Security Platform (ASP) now supports both Docker and DCOS. llumio ASP works by injecting a virtual enforcement agent into the operating system on which the application workload runs. Every time that workload moves, the virtual enforcement agent travels with it, while Illumio provides the management plane those security policies invoke via the cloud.

Alan Cohen, chief commercial officer for Illumio, says with these additions, ASP provides a software-based approach that can not only be used to secure hypervisors, but also extended to secure a variety of emerging technologies in the enterprise.

IllumioASP-Securing-Mesosphere-Docker

Obviously, IT security needs to be a major concern. But IT organizations also need to be able to freely innovate. Otherwise, IT security becomes an albatross around the neck of IT innovation. In the case of Illumio, IT organizations gain access to a cloud security service through which security policies can be more consistently enforced across multiple platforms.

Of course, the cloud itself is often a source of much IT insecurity, so naturally there’s a certain sense of irony in relying on one rapidly maturing technology to help ensure the secure adoption of other emerging technologies that are just now starting to gain traction in production environments.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Hyperscalers: Will They Upend the Mainframe Market?
Tom Taulli
Nov 22, 2021
PagerDuty Report: Stress on IT Teams on the Rise
Mike Vizard
Jul 30, 2021
VMware Adds Subscription Option for VMware Cloud
Mike Vizard
Mar 31, 2021
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.