Enable javascript in your browser for better experience. Need to know to enable it?

÷ÈÓ°Ö±²¥

La informaci¨®n en esta p¨¢gina no se encuentra completamente disponible en tu idioma de preferencia. Muy pronto esperamos tenerla completamente disponible en otros idiomas. Para obtener informaci¨®n en tu idioma de preferencia, por favor descarga el PDF ²¹±ç³Ü¨ª.
?ltima actualizaci¨®n : Nov 20, 2019
NO EN LA EDICI?N ACTUAL
Este blip no est¨¢ en la edici¨®n actual del Radar. Si ha aparecido en una de las ¨²ltimas ediciones, es probable que siga siendo relevante. Si es m¨¢s antiguo, es posible que ya no sea relevante y que nuestra valoraci¨®n sea diferente hoy en d¨ªa. Desgraciadamente, no tenemos el ancho de banda necesario para revisar continuamente los anuncios de ediciones anteriores del Radar. Entender m¨¢s
Nov 2019
Adoptar ?

La adopci¨®n continua de contenedores para los despliegues, en particular Docker, ha tornado el an¨¢lisis de seguridad de los contenedores en una t¨¦cnica necesaria, y hemos movido esta t¨¦cnica a ¡°Adoptar¡± para reflejar este hecho. En particular, los contenedores introdujeron una nueva v¨ªa para los problemas de seguridad; es vital que se utilicen herramientas para analizar y revisar los contenedores durante el despliegue. Preferimos utilizar herramientas de an¨¢lisis autom¨¢tico que corran como parte del pipeline de despliegue.

Apr 2019
Probar ?

The container revolution around Docker has massively reduced the friction in moving applications between environments, fueling increased adoption of continuous delivery and continuous deployments. The latter, especially, has blown a rather large hole in the traditional controls over what can go to production. The technique of container security scanning is a necessary response to this threat vector. Tools in the build pipeline automatically check containers flowing through the pipeline against known vulnerabilities. Since our first mention of this technique, the tool landscape has matured and the technique has proven useful on development efforts with our clients.

Mar 2017
Evaluar ?

The container revolution instigated by Docker has massively reduced the friction in moving applications between environments but at the same time has blown a rather large hole in the traditional controls over what can go to production. The technique of container security scanning is a necessary response to this threat vector. Docker now provides its own , as does , and we've also had success with the . Whichever approach you take, we believe the topic of automated container security validation is of high value and a necessary part of PaaS thinking.

Nov 2016
Evaluar ?

The container revolution instigated by Docker has massively reduced the friction in moving applications between environments but at the same time has blown a rather large hole in the traditional controls over what can go to production. The technique of container security scanning is a necessary response to this threat vector. Docker now provides its own , as does , and we¡¯ve also had success with the . Whichever approach you take, we believe the topic of automated container security validation is of high value and a necessary part of PaaS thinking.

Publicado : Nov 07, 2016

Suscr¨ªbete al bolet¨ªn informativo de Technology Radar

?

?

?

?

Suscr¨ªbete ahora

Visita nuestro archivo para leer los vol¨²menes anteriores