⛈️ Network Policies bringing you or your production down?
Beat them in the hands-on, no-setup Network Policies lab

Blog & Content

Read things that Otis, our sweet mascot, wrote. Oh, and also the rest of the team. But they aren't otters so whatevs.

  • Zero-trust
  • Kubernetes
  • Network Policy
  • Lab
Blog
Sep 17 2024
Automate Kubernetes Network Policies with Otterize: Hands-on Lab for Dynamic Security

Let's talk about the challenges of Kubernetes Network Policies as you scale and progress through your development lifecycle journey. Even better, experiment with how Otterize overcomes these challenges in a practical lab!

    • Network
    • Kubernetes
    • Go
    Blog
    Jan 20 2024
    Network mapper, I see you!

    Learn about the recently developed Otterize network mapper, an open-source tool dedicated to efficiently mapping communication within a Kubernetes cluster by creating functional network maps, focusing on simplicity and effectiveness in revealing pod-to-pod interactions.

    • Core
    • IBAC
    • Network Policy
    • AWS
    • EKS
    Blog
    Sep 13 2023
    How to gradually roll out network policies with the new AWS EKS VPC

    Learn how Otterize makes it easy to apply zero-trust network policies to one service while being completely certain you aren't affecting any others. Discover how you can do that in a few minutes.

    • Core
    • IBAC
    • Network Policy
    • AWS
    • EKS
    Blog
    Aug 31 2023
    AWS releases built-in network policy enforcement for AWS EKS

    Discover the latest advancement in AWS EKS as AWS unveils built-in support for enforcing Kubernetes network policies using the native VPC CNI, and simplify the implementation challenges with the open-source Otterize intents operator and network mapper.

    • Kubernetes
    • Network Policy
    • Zero-trust
    • IBAC
    Blog
    Aug 07 2023
    Using Helm dashboard and intents-based access control for pain-free network segmentation

    Explore an effortless method for Kubernetes network segmentation using Helm Dashboard and the intents operator, enabling a gradual transition to zero trust with step-by-step network policy implementation.

    • IBAC
    • Kubernetes
    • Network
    Blog
    Jul 19 2023
    Joining Otterize and the modern network stack

    In this blog post, delve into my journey of joining Otterize as the Head of Developer Relations after a background in data and IoT, exploring the exciting shift into the realm of Kubernetes and the modern network stack.

    • IBAC
    • Network Policy
    Blog
    Apr 24 2023
    Revisiting network policy management

    Explore my journey of revisiting network policy management after three and a half years, reflecting on the challenges faced at Monzo and discovering the evolution towards a solution through intent-based access control for effective service authorization rules.

    • Podcasts
    Blog
    Apr 23 2023
    Understanding intent-based access control

    How does one understand and define the intent? And more importantly, how to we enforce our intentions with access control? This week's guest is Uri Sarid, he is a man with a long list of credentials and walks us through exactly what is intent-based control and how we can implement it in our organizations.

    • Webinars
    Blog
    Apr 14 2023
    Simplify Kubernetes cluster mapping

    In this tutorial, we'll explore how to streamline Kubernetes cluster mapping using open-source tools that enable you to visualize pod-to-pod traffic within your K8s environment.

    • Zero-trust
    • IBAC
    Blog
    Mar 29 2023
    Least-privilege for Kafka data

    Discover the key challenges and solutions in securing sensitive data within Kafka, emphasizing the significance of least-privilege access control across various use cases such as event-driven architectures, messaging, queuing, and data stream aggregation.