Analytics

10/31/2018
03:36 PM
50%
50%

Qualys Snaps Up Container Firm

Plans to use Layered Insight's technology to add runtime capabilities and automated enforcement to its container security tool.

Security firm Qualys has agreed to acquire Layered Insight in a move intended to build on the capabilities of its current container security tool, the companies confirmed today.

Layered Insight, founded in 2015 and based in Pleasanton, Calif., aims to bring together DevOps and SecOps by providing visibility across containerized applications. Qualys plans to use its technology to add more visibility and runtime app protection to its Container Security platform.

More specifically, Layered Insight can map runtime behavior to provide a deeper understanding of containerized applications. Its system can also detect and prevent breaches during runtime and gives admins the option to set alerts for anomalies and automate enforcement. Qualys anticipates Layered Insight will be integrated into its cloud platform by the second half of 2019.

Co-founders Asif Awan and John Kinsella will be joining Qualys as CTO of container security and vice president of engineering, container security, respectively.

This is the latest purchase in Qualys' startup shopping spree. It most recently announced its intent to buy Second Front Systems in June 2018; in April, it acquired the software assets of 1Mobility. In Nov. 2017 it purchased NetWatcher assets for cloud-based threat intelligence, a few months after it bought assets of Nevis Networks to improve on network traffic analysis.

Read more details here.

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
How Well Is Your Organization Investing Its Cybersecurity Dollars?
Jack Jones, Chairman, FAIR Institute,  12/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: So now we are monitoring the monitor?
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20136
PUBLISHED: 2018-12-13
XSS exists in FUEL CMS 1.4.3 via the Header or Body in the Layout Variables during new-page creation, as demonstrated by the pages/edit/1?lang=english URI.
CVE-2018-20137
PUBLISHED: 2018-12-13
XSS exists in FUEL CMS 1.4.3 via the Page title, Meta description, or Meta keywords during page data management, as demonstrated by the pages/edit/1?lang=english URI.
CVE-2018-20138
PUBLISHED: 2018-12-13
PHP Scripts Mall Entrepreneur B2B Script 3.0.6 allows Stored XSS via Account Settings fields such as FirstName and LastName, a similar issue to CVE-2018-14541.
CVE-2018-1817
PUBLISHED: 2018-12-13
IBM Security Guardium 10 and 10.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150021.
CVE-2018-1818
PUBLISHED: 2018-12-13
IBM Security Guardium 10 and 10.5 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 150022.