Head of Cloud-Native Security | System Architect
+10 years of experience in IT security, expert in SELinux
We mastered the traditional security perimeter model. Now, we are offering our clients the emerging complicated layering of cloud security. As all cybersecurity fields in Sorint, we’ve brough together a team of the finest in the field to ensure that our client’s infrastructure, application(s), network, storage layers stand as secure as possible.
Digital Technology Service
Digital Technology Service
The need of container security
In 2021, less than 40% of global organization ran containerized applications in production.
90% by 2027
Attackers are targeting the misconfiguration of cloud infrastructure (network, storage, identities and permissions), APIs and the software supply chain itself. Gartner 2023
K8s abstracts container networking, trading off the network security.
Traditional tools do not work with containerized environment. New tools and practices emerge every day.
The need of container security
In 2021, less than 40% of global organization ran containerized applications in production.
90% by 2027
Attackers are targeting the misconfiguration of cloud infrastructure (network, storage, identities and permissions), APIs and the software supply chain itself. Gartner 2023
K8s abstracts container networking, trading off the network security.
Traditional tools do not work with containerized environment. New tools and practices emerge every day.
Cost of dynamic approach
Cost of dynamic approach
The make it model
The make it model
Instantiated from
Every journey is a unique challenge, but our know-how:
Executed countless projects in the field to prominent entities in Europe, US, and Africa.
For various industries
Customer retention rate
Dedicated sircles specialized in given fields and technologies
Highest certification in various fields and “Training Partner” to some vendors
Expert PM with technical background ensuring project’s objectives are met
Instantiated from
Every journey is a unique challenge, but our know-how:
Executed countless projects in the field to prominent entities in Europe, US, and Africa.
For various industries
Customer retention rate
Dedicated sircles specialized in given fields and technologies
Highest certification in various fields and “Training Partner” to some vendors
Expert PM with technical background ensuring project’s objectives are met
Head of Cloud-Native Security | System Architect
+10 years of experience in IT security, expert in SELinux
Security Consultant | Software Architect
+10 years of experience in both application and infrastructure design
Reverse Engineer, Incident Responder, Opensource Developer and Contributor
CTF player, trainer, conferences regular speaker at DEFCON, Insomni’hack, Nullcon
Sircle (departments) involved
Head of Cloud-Native Security | System Architect
+10 years of experience in IT security, expert in SELinux
Security Consultant | Software Architect
+10 years of experience in both application and infrastructure design
Reverse Engineer, Incident Responder, Opensource Developer and Contributor
CTF player, trainer, conferences regular speaker at DEFCON, Insomni’hack, Nullcon
Sircle (departments) involved
Areas and fields of focus
Areas and fields of focus
Delivered by: SORINTians
Client faced several challenges with the current endpoint
Container security solution. Both on functionality and administrational levels.
Analysing and understanding the infrastructure
For its centralized administration console and it’s powerful integration with vSphere virtualization systems. It was decided to integrate the infrastructure with Carbon Black Workload Protection.
The solution’s has various pros. E.g.
Result & delivery
Delivered by: SORINTians
Client faced several challenges with the current endpoint
Container security solution. Both on functionality and administrational levels.
Analysing and understanding the infrastructure
For its centralized administration console and it’s powerful integration with vSphere virtualization systems. It was decided to integrate the infrastructure with Carbon Black Workload Protection.
The solution’s has various pros. E.g.
Result & delivery