Abstract

The techniques described herein enable customers to leverage existing investments in legacy non-containerized firewalls or other legacy appliances while performing those security, and other, functions on traffic originating from new containerized workloads running elsewhere in the enterprise. This provides an end-to-end solution that solves a number of pragmatic real world problems that enterprise customers will face as they move toward cloud and containers while wanting to leverage their existing investments in security and firewall appliances.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS