Skip to content

 

We’re excited to announce that the Uptycs EKS Add-on is now available in the AWS Marketplace for Containers. As part of the AWS Marketplace Challenge, AWS users can explore our advanced security solutions and secure their EKS clusters with an extended trial. This new offering provides AWS users with an effective way to secure their cloud environments, addressing critical container and Kubernetes security challenges.

 

 

Simplifying Kubernetes Security with the Uptycs EKS Add-ons

Organizations traditionally face challenges in managing Kubernetes security due to its complexity. The Uptycs EKS Add-ons go beyond traditional solutions by offering unified protection from development to runtime, addressing critical vulnerabilities and risks in Kubernetes environments. Recent incidents like Kinsing Malware, RBAC Buster, and Wireserving have demonstrated how vulnerabilities, over-permissioned identities, and privilege escalations can be exploited to steal data and compromise sensitive information.

To counter threats, we are integrating the Uptycs add-ons into EKS cluster blueprints for full governance and lifecycle management of all workloads.

Uptycs is releasing two add-ons for enterprise customers: 

  • Uptycs Collector: The Uptycs collector provides end-to-end visibility and risk management for the Kubernetes control plane, including the ability to surface network exposure of containers and misconfigured RBAC. It can also perform admission controls to ensure only secure deployments of images and other Kubernetes resources.
  • Uptycs eBPF Runtime Sensor: The Uptycs runtime sensor provides deep eBPF-level visibility, vulnerability prioritization, threat detection, and dev-to-runtime protection of EKS Workloads for best-in-class container security.

 

Copy of SASIG webinar Deck - Software Pipeline September 2024

Key Benefits of the Uptycs EKS Add-ons

With this new add-on, organizations can take advantage of advanced container and Kubernetes security features, helping them better manage security risks and safeguard their AWS environments. Key benefits include:

  • Seamless Installation and Onboarding: Integrate with native AWS EKS tooling, including EKSCTL and AWS CLI, to align the deployment of the Uptycs add-ons with EKS lifecycle management and EKS blueprints for governed deployments.
  • Runtime Insights: Prioritize risks based on what’s active and running in your environment, making it easier to identify and address the most critical issues.
  • Determine Exposure Risk and Threat Boundaries: Detect network vulnerabilities and analyze exposure risks from AWS VPC and Gateway all the way down to Cilium Network Policies assigned to a pod.
  • Quick Root Cause Analysis: Use image provenance to trace malicious runtime risks back to actual code commits, enabling quicker identification and resolution of security incidents.
  • Enhance Identity & Access Management: Identify excessive permissions inside clusters and mitigate risks associated with risky service accounts, users, and groups.

 

 

Getting Started with the Uptycs EKS Add-ons

With the Uptycs EKS Add-ons now available, AWS users can easily integrate advanced security capabilities into their Kubernetes environments.

“Uptycs is redefining Kubernetes security by integrating a comprehensive approach that prioritizes runtime-first posture management alongside advanced behavioral detection and response,” said Ganesh Pai, CEO of Uptycs. “Our platform delivers real-time security at scale, in one instance, securing 125,000+ Kubernetes pods for a top 20 global website. Our cloud and container security competencies are AWS-validated and specifically optimized for AWS environments.”

Get started by adding Uptycs EKS Add-ons in AWS Marketplace or sign up for the AWS Marketplace Challenge and see how Uptycs can help secure your organization’s Kubernetes environment today.