Applying Moving Target Defense to Container Environments

Alex Gounares | June 22, 2017

Homogeneity makes static environments an easy target for hackers, who have access to the same software available to developers, be it Linux, Windows, or the numerous application stacks like Java. Attackers can analyze and craft attacks at leisure, knowing that successful exploits can often be used against millions of computers— “break once, run anywhere.”

Security teams defend static infrastructure by trying to predict, detect, analyze, investigate and remediate attacks. This is expensive, time consuming, unwieldy and, moreover, ineffective.

Your organization can save time, money and resources by applying dynamic diversity through code scrambling and container cycling, which provide intrinsic protection for container environments. Moving Target Defense continuously changes the attack surface before hackers have a chance to decipher the environment – mitigating the attack before it happens.

In this webinar, Polyverse CEO Alex Gounares will explain how Moving Target Defense can be applied to make container environments impenetrable.

Key points include: