About Us

Codenotary launched monitoring for Kubernetes

Codenotary KUBERNETES CLOUD SECURITY
A VPN is an essential component of IT security, whether you’re just starting a business or are already up and running. Most business interactions and transactions happen online and VPN

Codenotary has released full-stack monitoring for Kubernetes and VMware vSphere for operations and DevOps teams, allowing them to monitor Kubernetes and virtualized infrastructure in one place. According to the 2021 Cloud-Native Survey, 96 percent of organizations already have or are evaluating Kubernetes, with 5.6 million developers worldwide using Kubernetes. Monitoring is still done separately in many Kubernetes deployments running on virtualized infrastructure, such as VMware vSphere, resulting in multiple information silos that must be connected. Immutable Metrics & Logs provide a comprehensive solution.

Dennis Zimmer, co-founder, and chief technology officer of Codenotary commented, “Our technology delivers the fastest deploy-to-value ratio. With Codenotary Immutable Metrics & Logs, customers see near-instant results from their deployments, whether in the cloud or on-premises. Additionally, we provide the only technology that stores logs and configuration changes that are fully verifiable and auditable, making regulatory and license compliance pain-free.”

Immudb, the only open-source enterprise-class immutable database with data permanence at scale for demanding applications requiring billions of transactions per day, is maintained by Codenotary. Codenotary’s notarization and verification products are built on immudb. Immudb has received over 12 million downloads.

Immudb, the only open-source enterprise-class immutable database with data permanence at scale for demanding applications requiring billions of transactions per day, is maintained by Codenotary. Codenotary’s notarization and verification products are built on immudb. Immudb has received over 12 million downloads.

Codenotary offers tools for cataloging and trusting components of the software development lifecycle which help attest to the origin and safety of the code. It further improves this core functionality by providing an additional tamper-proof layer that processes and stores millions of transactions per second, on-premise or as a cloud service, and with cryptographic verification. It allows developers to attach a Software Bill of Materials (SBOM) for development artifacts such as source code, builds, repositories, and so on, as well as Docker and Kubernetes container images for their software.

Tarun Keswani, principal staff engineer of Motorola Solutions stated, “We were set up and operational in less than 30 minutes providing immediate benefits and insights, highly recommended.”

Read more articles:

Cloud Security?

Recent News

Newsletter

SUBSCRIBE TO OUR NEWSLETTER!!