Product

Kaspersky Hybrid Cloud Security for DevOps

Show Gartner Peer Insights reviews
“Security as code” - bridging the gap between development and information security

Leading container security for DevOps

Security that helps you to be nimble and deliver innovation in time

Kaspersky Hybrid Cloud Security enables a DevSecOps approach, providing both run-time development infrastructure protection and a “security as code” service for CI/CD pipeline integration. It bridges the gap between development and information security specialists thanks to a powerful management console, broad platform support, integration interfaces and the ideal efficacy/performance ratio. It secures Docker platform to prevent attackers from using a malicious container layer as a gateway into the organization’s infrastructure, and provides IT and IT security administrators with security control, visibility and risk management tools, while automation and pipeline building help DevOps run On-Demand security scans, maintain clean corporate repositories and sanitize entities pulled from public repos.

Wide range of supported platforms

Kaspersky Hybrid Cloud Security natively integrates with the most popular operating systems, containerization and virtualization platforms, local and global IaaS providers.

Securing supply chain

Local and remote repository scanning prevents attacks on the most sensitive assets through a poisoned supply chain

“Security as code”

Scripting and programming interfaces enable security checks on demand, augmenting CI/CD pipelines and enabling a DevSecOps approach.

In Use

  • Rich integration options enable a “security as code” approach

    A complete toolset and the interfaces necessary to take full advantage of a “security as code” approach to exercise lean software practices and just-in-time application building, packaging and delivery without impacting the performance.

    • CI/CD platform integrations (e.g. Jenkins) simplify pipeline building and automation
    • On-Access (OAS) and On-Demand Scanning (ODS) of containers, images and local and remote repositories
    • Namespace monitoring, flexible scan scope control and the ability to scan different layers of containers help follow the best practices.
  • Unparalleled security at the core

    Kaspersky is renowned for our security expertise and cutting-edge protection technology. We offer:

    • Next-generation protection against ransomware and fileless malware
    • Network Threat Protection (IPS/IDS)
    • Anti-ransomware protection for guest OS and shared data
    • Cloud-assisted server protection
    • Exploit prevention
    • System hardening
    • File Integrity Monitoring
    • Log Inspection
    • Container protection
  • Unified Orchestration

    The fully scalable management console facilitates comprehensive security management:

    • Automated deployment
    • Policy-based management
    • ‘Single pane of glass’ management
    • Management server hierarchy
    • Scalability by design - up to 100,000 cloud workloads managed through a single server
    • High availability configurations
    • Granular Role-Based Access Control (RBAC)
    • High visibility with configurable reporting and dashboards
24/7

Premium Support

Professional help is available whenever you need it. Operating in more than 200 countries, from 34 offices worldwide, we have you covered 24/7/365. Take advantage of our Premium support packages, or call on our Professional Services to ensure that you derive maximum benefit from your Kaspersky security installation.

White Papers

Learn more, with thought leadership from our globally recognized cybersecurity experts

Supported Platforms

For the complete list of supported platforms and restrictions, please visit support.kaspersky.com

The Threats

DevOps work under constant pressure - for speed, pressure for accuracy, pressure for innovation. There are a lot of moving parts, and security requirements may look like a critical friction element endangering the results that DevOps work towards. But keeping security away from your critical processes is not a good solution.

  • <p>Inadequate security negatively impacts key DevOps metrics, such as Deployment Frequency, Availability or Mean-Time-To-Detection, and hurts your business.</p>

    Inadequate security negatively impacts key DevOps metrics, such as Deployment Frequency, Availability or Mean-Time-To-Detection, and hurts your business.

  • <p>A lack of security in the key control points of the DevOps cycle can compromise your infrastructure – and your product – and impact your business’s image and relationships with partners and customers.</p>

    A lack of security in the key control points of the DevOps cycle can compromise your infrastructure – and your product – and impact your business’s image and relationships with partners and customers.

  • <p>Supply chain is a critical dependency for DevOps. Without proper sanitization and control, malicious images may be pulled even from official repositories and remain undetected for months.</p>

    Supply chain is a critical dependency for DevOps. Without proper sanitization and control, malicious images may be pulled even from official repositories and remain undetected for months.

  • <p>A lack of integration interfaces leads to fragmented automation, manual work, overcomplicated processes and may eventually result in lost time and security incidents being overlooked.</p>

    A lack of integration interfaces leads to fragmented automation, manual work, overcomplicated processes and may eventually result in lost time and security incidents being overlooked.

Alliances

Together with our technology alliances, we help to smooth your path towards digital transformation and secure cloud adoption.

Related to this Product