Resource Library
Read blogs by Otis, run self-paced labs that teach you how to use Otterize in your browser, or read mentions of Otterize in the media.
- Zero-trust
Automate Kubernetes Network Policies with Otterize: hands-on lab for dynamic security
Let's talk about the challenges of Kubernetes Network Policies as you scale and progress through your development lifecycle journey. Even better, experiment with how Otterize overcomes these challenges in a practical lab!
- Zero-trust
Automate Kubernetes Network Policies with Otterize: hands-on lab for dynamic security
Let's talk about the challenges of Kubernetes Network Policies as you scale and progress through your development lifecycle journey. Even better, experiment with how Otterize overcomes these challenges in a practical lab!
- Network Policy
Feb 12 2024Network policies are not the right abstraction (for developers)
We explore the limitations of relying solely on Kubernetes network policies as a solution for achieving zero-trust between pods, identifying multiple flaws that hinder their effectiveness in meeting the demands of real-world use cases, particularly when prioritizing developer experience in a Kubernetes-based platform.
- Kubernetes
Jan 24 2024First Person Platform Episode 1 - Andrew Fong on Dropbox Grouper
The first episode of First Person Platform, a podcast: platform engineers nerd out with Ori Shoshan on access controls, Kubernetes, and platform engineering.
- Network
Jan 20 2024Network mapper, I see you!
Learn about the recently developed Otterize network mapper, an open-source tool dedicated to efficiently mapping communication within a Kubernetes cluster by creating functional network maps, focusing on simplicity and effectiveness in revealing pod-to-pod interactions.
- Press
Jan 09 2024Hot on the Heels of AWS re:Invent 2023, Otterize Expands Workload Identity and Access Management Platform to Include Support for AWS IAM and PostgreSQL
Otterize enhances its platform with AWS IAM and PostgreSQL support, complementing existing features like Kubernetes network policies, Istio authorization policies, and Kafka ACLs. These additions enable organizations to seamlessly manage access to critical resources and databases, reinforcing a comprehensive zero-trust security model.
- Kubernetes
Aug 07 2023Using Helm dashboard and intents-based access control for pain-free network segmentation
Explore an effortless method for Kubernetes network segmentation using Helm Dashboard and the intents operator, enabling a gradual transition to zero trust with step-by-step network policy implementation.
- IBAC
Apr 24 2023Revisiting network policy management
Explore my journey of revisiting network policy management after three and a half years, reflecting on the challenges faced at Monzo and discovering the evolution towards a solution through intent-based access control for effective service authorization rules.
- Press
Apr 19 2023Intent-based access control for Kubernetes and cloud
- Press
Apr 03 2023Otterize raises $11.5M to help developers securely connect software services
- Zero-trust
Mar 29 2023Least-privilege for Kafka data
Discover the key challenges and solutions in securing sensitive data within Kafka, emphasizing the significance of least-privilege access control across various use cases such as event-driven architectures, messaging, queuing, and data stream aggregation.