Application Security , Containerization & Sandboxing , Endpoint Security

Protecting Apps and Data in Kubernetes

Cequence's Security's Shreyans Mehta on the Next Degree of API Security
Shreyans Mehta, Co-Founder & CTO at Cequence Security, Inc.

Kubernetes is rapidly becoming the leading container orchestration tool. Shreyans Mehta, CTO and co-founder of Cequence Security shares insights on what’s different about Kubernetes and how organizations should be securing it.

In this video interview with ISMG, Mehta discusses:

  • APIs of applications and services being contained;
  • The APIs of Kubernetes;
  • What’s at risk if you don’t address Kubernetes security concerns.

Mehta is an innovator in network security and holds several patents in the field. Before co-founding Cequence Security, he was Architect and Technical Director at Symantec, where he led the development of one of the most advanced network security platforms and intrusion prevention technologies based on real-time packet inspection and cloud-based big data analytics. It’s responsible for detecting more than half of the billions of threats that Symantec identifies every year. At Symantec, Shreyans started the Safeweb initiative for marking malicious sites in search results and played a key role in making it a successful standalone product. In partnership with VMware, he developed one of the first agentless IPS engines that transparently protect virtual machines. Before that, he was a lead engineer at VPN Dynamics, a VPN/firewall startup. Shreyans has a Masters in Computer Science from the University of Southern California.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.