- Open Source
- Contact Us
Advanced machine-learning activity engine identifies traffic baselines, so abnormal traffic can be identified and attacks, such as data breaches and data exfiltration, stopped.
Deep-inspection engine stops threats in all traffic, including internal traffic encrypted with Istio or other service mesh.
Egress visibility and enforcement gives you full control of data sent to the public Internet.
Kubernetes and Istio policies can be managed in one place for all your deployments.
Identity-based control allows you to authenticate each and every microservice and authorize activity based on declarative or learned policies.
Automated policy enforcement ensures the authorization and authentication of traffic to and from a microservice is adjusted based on changes in a microservice’s behavior.
Automatic encryption of traffic safeguards privacy, without exception. It also means you no longer need to deploy VPNs to secure traffic between multi-cloud environments.
Vendor and platform independence allows you to quickly and easily deploy security in any environment or any deployment model – cloud, VM, container, serverless, etc.
Highlights of unsecure container deployments help you create a safer and compliant environment.
Real time monitoring helps you identify ways to improve your security posture as your deployments evolve.
Security highlights help your team focus on the most important steps to keep your deployments safe and compliant.
Topology and policy visualization of all your microservices makes it easy to understand exactly what’s going on with your cloud-native apps.
Unified view helps you see the big picture and make decisions that maximize the value of your cloud-native apps and strengthen your security mesh.
Significant changes in your deployments, threats and policy violations are highlighted to accelerate the identification and remediation of any risks.
Real-time policy recommendations help your keep your network policy up to date as your applications evolve.
Ability to ensure encryption is done properly and covers protecting your entire environment.
Octarine secures all the microservices of all your cloud-native apps, regardless of how or where they are deployed – in public and private clouds, using containers, virtual machines or serverless. With Octarine, you get the insights and protection you need to ensure your cloud-native apps align with all your business and security objectives.
The Octarine Application-Level Security Platform consists of the Octarine Controller, which can be deployed on-premises or in the cloud, and a mesh of lightweight modules, OctaGuards, that are tightly coupled with the microservices. OctaGuard is based on Envoy the open-source proxy designed for cloud-native applications.
processes the metadata collected by the OctaGuards and automatically adapts policies, based on current conditions, to ensure they remain aligned with your business and security objectives. The Controller’s Visibility, Security and Policy Engines uncover insights, identify threats and automate the definition and enforcement of access control and content-level policies based on real-time cloud-native conditions.
collects metadata on the microservices and enforces policies pushed down by the Controller to ensure all microservice activity is authenticated and authorized and security threats are shut down.
“By 2019, 60% of server workloads will
use application control (whitelisting)”