Resource Library

Read blogs by Otis, run self-paced labs that teach you how to use Otterize in your browser, or read mentions of Otterize in the media.

  • Zero-trust
  • Kubernetes
  • Network Policy
  • Lab
Sep 17 2024
Automate Kubernetes Network Policies with Otterize: hands-on lab for dynamic security

Let's talk about the challenges of Kubernetes Network Policies as you scale and progress through your development lifecycle journey. Even better, experiment with how Otterize overcomes these challenges in a practical lab!

    • Network Policy
    • Kubernetes
    • Zero-trust
    Feb 12 2024
    Network policies are not the right abstraction (for developers)

    We explore the limitations of relying solely on Kubernetes network policies as a solution for achieving zero-trust between pods, identifying multiple flaws that hinder their effectiveness in meeting the demands of real-world use cases, particularly when prioritizing developer experience in a Kubernetes-based platform.

    • Kubernetes
    • Zero-trust
    • IBAC
    • Dropbox
    • Automation
    • Startups
    • Podcasts
    Jan 24 2024
    First Person Platform Episode 1 - Andrew Fong on Dropbox Grouper

    The first episode of First Person Platform, a podcast: platform engineers nerd out with Ori Shoshan on access controls, Kubernetes, and platform engineering.

    • Network
    • Kubernetes
    • Go
    Jan 20 2024
    Network mapper, I see you!

    Learn about the recently developed Otterize network mapper, an open-source tool dedicated to efficiently mapping communication within a Kubernetes cluster by creating functional network maps, focusing on simplicity and effectiveness in revealing pod-to-pod interactions.

    • Press
    Jan 09 2024
    Hot on the Heels of AWS re:Invent 2023, Otterize Expands Workload Identity and Access Management Platform to Include Support for AWS IAM and PostgreSQL

    Otterize enhances its platform with AWS IAM and PostgreSQL support, complementing existing features like Kubernetes network policies, Istio authorization policies, and Kafka ACLs. These additions enable organizations to seamlessly manage access to critical resources and databases, reinforcing a comprehensive zero-trust security model.

    • Kubernetes
    • Network Policy
    • Zero-trust
    • IBAC
    Aug 07 2023
    Using Helm dashboard and intents-based access control for pain-free network segmentation

    Explore an effortless method for Kubernetes network segmentation using Helm Dashboard and the intents operator, enabling a gradual transition to zero trust with step-by-step network policy implementation.

    • IBAC
    • Network Policy
    Apr 24 2023
    Revisiting network policy management

    Explore my journey of revisiting network policy management after three and a half years, reflecting on the challenges faced at Monzo and discovering the evolution towards a solution through intent-based access control for effective service authorization rules.

    • Podcasts
    Apr 23 2023
    Understanding intent-based access control

    How does one understand and define the intent? And more importantly, how to we enforce our intentions with access control? This week's guest is Uri Sarid, he is a man with a long list of credentials and walks us through exactly what is intent-based control and how we can implement it in our organizations.

    • Press
    Apr 19 2023
    Intent-based access control for Kubernetes and cloud

    • Webinars
    Apr 14 2023
    Simplify Kubernetes cluster mapping

    In this tutorial, we'll explore how to streamline Kubernetes cluster mapping using open-source tools that enable you to visualize pod-to-pod traffic within your K8s environment.