Cloud Native

Deepfence Does a Deep Dive into Cloud-Native Security

0

Guest: Sandeep Lahane | Owen Garrett @owengarrett
Company: Deepfence
Show: Let’s Talk

Deepfence is a security observability platform for cloud and cloud-native EcoSys environments. It’s based on the ‘Security as a Microservice’ model and measures and maps runtime attack surfaces while providing full-stack protection against known and unknown threats.

Sandeep Lahane, Founder and CEO at Deepfence, understands it’s a very crowded market at the moment and the competition is only going to get tighter. And given the number of breaches that occurred in the past year, the market is going to get busier. To that, Lahane says, “Deepfence was built to protect the cloud-native continuum.” Lahane adds, “We don’t look at cloud-native continuum as one modality. We look at it as a continuum of technologies. You’ve got mediums, you’ve got capabilities, you’ve got serverless.”

Deepfence differs from other vendors in the space at the very core of their technology, which is cloud-native deep packet inspection. This lets companies monitor what comes in, what goes out, and what changes across time and space as well as across multiple modalities. With Deepfence, you don’t need a separate solution for the likes of Kubernetes or AWS, as they have it all covered…the whole cloud-native continuum (as well as across multiple clouds). This approach makes it possible for Deepfence to be singularly focused on runtime and production which is, according to Lahane, “basically about deep packet inspection, including plaintext traffic as well as encrypted traffic.” That’s the Deepfence core IP. How they create a more well-rounded solution is by adding some of the other table states, such as vulnerability scanning, supply chain security, and compliance enablement.

One area that’s very crucial to Deepfenceis deep observability, which enables deeper detection and better protection. To that, Lahane says, “What we are doing is, instead of going horizontal with security and generative observability, we are really going deeper in security observability.”

According to Owen Garrett, Head of Products and Community, Deepfence, “What we felt is that shift-left only solves half of the security problem.” Garrett continues, “There needs to be a way to carry that security across into production, and the existing production security tools don’t really fit in today’s cloud-native space, and that’s where Deepfence comes into the picture. We bring some of the technologies that you would use when you shift left, things like vulnerability scanning and compliance scanning, and we run those in production against production workloads.”

One of the most common causes of breaches in the cloud is, according to Lahane, miscalculation, when a deployment isn’t hardened or compliant enough. With ThreatMapper, Deepfence picks up where code scanning leaves off and allows them to get in the middle of the CI/CD cycle from DevOps, CloudOps, and all the way to SecOps. Deepfence carries the baton from left, from the center, and all the way to the right of CI/CD. On this, Lahane says, “I think this is the right place to sort of look at it because it’s a runtime phenomenon, really. You misconfigured things and somebody’s exploiting them in production.” Lahane adds, “If you look at this whole journey, I spoke about the far left, the center, the left of center, the right of the center and the right, which is where SecOps is; the left part is really well-served. What is underserved still, and the community just didn’t have a powerful tool to do that, that’s a need ThreatMapper is filling in.”

Deepfence cares deeply about open source, which led them to open-sourcing ThreatMapper. Why? According to Garrett, “Security, we believe, is a public good, the financial or economic definition of a public good. It’s something that everybody should be able to benefit from, something that everybody collaborates to create, and many of the resources that we use within our open-source product are public goods in their own right.” Garrett adds, “What we’re aiming to do with our open-source platform is to take all of those community and public resources and build an easy to deploy, easy to use, safe, and trusted platform that will allow anybody to use the open-source technology to scan their applications, find and prioritize vulnerabilities, and visualize what’s happening within their application estate.”

But how is Deepfence going about open source differently than the standard “open core” model? Garrett explains it like this, “The security observability technology that we’ve talked about, our commitment is that, will become part of an open-source platform, something that’s 100% open source, and a platform because the data that we gather, we will also make available through a series of APIs. What this then allows us to do, and for other agencies to do, is to build products and tools that are separate from the platform, talk through the APIs, and those are tools that in themselves could become commercial and monetizable.”

According to Lahane, the core technology of Deepfence cloud-native security platform has been available for the past year. They have dozens of early adopters, customers who are using it to scale. With their new open-source initiative, Lahane says, “What we released had basically two things: One is the attack surface measurement component, which is what ThreatMapper is, and the detection and protection component, which is what ThreatStrike is.” Lahane continues,  “We’re basically taking that platform that we already have in production, having two parts of it, and essentially opening up the first part. ThreatStrike is just going to be an add-on on top of ThreatMapper. So it is going to use the same public APIs that we’re making available for the community. If somebody wants to come in and build something like ThreatStrike on top of that, they could.”

The summary of the show is written by Jack Wallen

Read Full Transcript & Technical Deep Dive

Iter8: Release Engineering for Cloud Native Applications

Previous article

Red Hat Announces Updates To Red Hat OpenShift And Red Hat Advanced Cluster Management For Kubernetes

Next article