With flexible deployment options from cloud native to cloud-hybrid applications, Cloudentity’s Microperimeter™ Enforcement can easily fit your existing infrastructure
Consul, Istio and Kubernetes
Sub millisecond Policy enforcement at the pod edge increases performance, reduces latency, resulting in a fast user experience. Cloudentity’s identity security products were built from the ground up to work with your favorite container orchestration platform . Once deployed in a Kubernetes cluster, the sidecar automatically registers with the central repository providing true East/West tracking and security.
Reducing the time for authentication and authorization means eliminating roundtrip calls between data centers. Cloudentity’s authorization services are deployed at the service edge, minimizing latency and producing a high speed customer experience.
Each Cloudentity product is distributed as a Docker container or lightweight installable Linux package. This approach allows you to:
- Use declarative formats for setup automation and fast developer onboarding
- Offer maximum portability between execution environments
- Minimize divergence between development and product environments, enabling continuous deployment
- Scale up without significant changes to tooling or practices