Implementing BeyondCorp security with AWS Cloud’s Application Load Balancer
Traditional VPN-based perimeter security models for remote access breaks down in the AWS public cloud. We show you how to use Banyan to leverage AWS Application Load Balancer's build-in auth capabilities to deliver high-security access controls for sensitive internal applications.
Why a Service Mesh architecture is the ideal way to deliver Zero Trust and BeyondCorp security
Many security leaders today evangelize Service Mesh as a future proof way to deploy ZeroTrust and BeyondCorp security. We agree! We compare a service mesh approach to existing Zero Trust architectures and explain why Banyan's Secure Service Mesh is ideally suited to deliver secure access for today’s borderless cloud environments.
What the heck is Zero Trust Security? How is it related to BeyondCorp? When can I have it?
The terms BeyondCorp and Zero Trust have become extremely popular in the security world today. We explain how both terms espouse the same underlying principle - replacing traditional perimeter security with distributed access controls. We also analyze why so many BeyondCorp and Zero Trust projects fail, and propose 4 general guidelines for enterprises looking to succesfully operationalize such security initiatives.
Securing Kafka, Istio-style, with higher than native mTLS performance in microservice environments
We present a new approach to protect Kafka in multi-tenant, dynamic microservice environments that leverages transparent sidecars to provide superior security, high mTLS performance, and simplified operations, nicely complementing Kafka native security features.
Notes from Container World 2017 in Santa Clara, CA
Banyan was a sponsor and participant at Container World 2017 held from 21-23 Feb 2017 in Santa Clara, CA. Here's a summary of our panel session on security for containers and microservices, as well as brief notes on a few other interesting presentations.
The case for novelty: securing the dynamic attack surface of cloud-native applications and microservices
As enterprises adopt agile cloud-native and microservice architectures, security teams are being challenged to continuously protect a dynamic sprawling attack surface. This new challenge also gives us the exciting opportunity to innovate and re-think security processes and technologies.