Resource Library
Read blogs by Otis, run self-paced labs that teach you how to use Otterize in your browser, or read mentions of Otterize in the media.
- Zero-trust
Automate Kubernetes Network Policies with Otterize: hands-on lab for dynamic security
Let's talk about the challenges of Kubernetes Network Policies as you scale and progress through your development lifecycle journey. Even better, experiment with how Otterize overcomes these challenges in a practical lab!
- Zero-trust
Automate Kubernetes Network Policies with Otterize: hands-on lab for dynamic security
Let's talk about the challenges of Kubernetes Network Policies as you scale and progress through your development lifecycle journey. Even better, experiment with how Otterize overcomes these challenges in a practical lab!
- Network Policy
Feb 12 2024Network policies are not the right abstraction (for developers)
We explore the limitations of relying solely on Kubernetes network policies as a solution for achieving zero-trust between pods, identifying multiple flaws that hinder their effectiveness in meeting the demands of real-world use cases, particularly when prioritizing developer experience in a Kubernetes-based platform.
- Kubernetes
Jan 24 2024First Person Platform Episode 1 - Andrew Fong on Dropbox Grouper
The first episode of First Person Platform, a podcast: platform engineers nerd out with Ori Shoshan on access controls, Kubernetes, and platform engineering.
- Network
Jan 20 2024Network mapper, I see you!
Learn about the recently developed Otterize network mapper, an open-source tool dedicated to efficiently mapping communication within a Kubernetes cluster by creating functional network maps, focusing on simplicity and effectiveness in revealing pod-to-pod interactions.
- Press
Jan 09 2024Hot on the Heels of AWS re:Invent 2023, Otterize Expands Workload Identity and Access Management Platform to Include Support for AWS IAM and PostgreSQL
Otterize enhances its platform with AWS IAM and PostgreSQL support, complementing existing features like Kubernetes network policies, Istio authorization policies, and Kafka ACLs. These additions enable organizations to seamlessly manage access to critical resources and databases, reinforcing a comprehensive zero-trust security model.
- Kubernetes
Aug 07 2023Using Helm dashboard and intents-based access control for pain-free network segmentation
Explore an effortless method for Kubernetes network segmentation using Helm Dashboard and the intents operator, enabling a gradual transition to zero trust with step-by-step network policy implementation.
- IBAC
Apr 24 2023Revisiting network policy management
Explore my journey of revisiting network policy management after three and a half years, reflecting on the challenges faced at Monzo and discovering the evolution towards a solution through intent-based access control for effective service authorization rules.
- Podcasts
Apr 23 2023Understanding intent-based access control
How does one understand and define the intent? And more importantly, how to we enforce our intentions with access control? This week's guest is Uri Sarid, he is a man with a long list of credentials and walks us through exactly what is intent-based control and how we can implement it in our organizations.
- Press
Apr 19 2023Intent-based access control for Kubernetes and cloud
- Webinars
Apr 14 2023Simplify Kubernetes cluster mapping
In this tutorial, we'll explore how to streamline Kubernetes cluster mapping using open-source tools that enable you to visualize pod-to-pod traffic within your K8s environment.