Resource Library

Read blogs by Otis, run self-paced labs that teach you how to use Otterize in your browser, or read mentions of Otterize in the media.

  • Zero-trust
  • Kubernetes
  • Network Policy
  • Lab
Sep 17 2024
Automate Kubernetes Network Policies with Otterize: hands-on lab for dynamic security

Let's talk about the challenges of Kubernetes Network Policies as you scale and progress through your development lifecycle journey. Even better, experiment with how Otterize overcomes these challenges in a practical lab!

    • Press
    Apr 03 2023
    Otterize raises $11.5M to help developers securely connect software services

    • Zero-trust
    • IBAC
    Mar 29 2023
    Least-privilege for Kafka data

    Discover the key challenges and solutions in securing sensitive data within Kafka, emphasizing the significance of least-privilege access control across various use cases such as event-driven architectures, messaging, queuing, and data stream aggregation.

    • Core
    • Startups
    Jan 31 2023
    Launching Otterize Cloud Beta

    Introducing Otterize Cloud beta: Elevate your Otterize OSS experience with optional visibility, confidence, and operational insights for seamless access management in your cluster, offering valuable control and ease.

    • Kubernetes
    • Network
    Aug 08 2022
    Kubernetes traffic discovery

    Discover the intricacies of Kubernetes communication as we unveil our open-source traffic discovery tool, providing a detailed exploration of our approach to mapping the network of services and deciphering "who's calling whom" within the cluster.

    • Core
    • Startups
    Jul 08 2022
    The essence

    Discover the thrill of "the startup way," exploring the continuous joy of discovery throughout a startup's growth, including aspects like team dynamics, technologies, insights about businesses, and personal revelations.

    • Core
    • Network
    Jul 07 2022
    So you want to deploy mTLS

    Join the journey of a platform engineer securing traffic in a production environment, as they explore implementing mTLS to ensure encryption and authentication in a way that's user-friendly for the whole team.