QTSEC
Home > Cloud Native Security > Micro-segmentation
Container micro-segmentation prevents lateral
penetration for zero trust
Functions

Provide network topology relationship from business perspective

Based on the actual business workload visual display of the access behaviour between containers, clearly show the network topology relationship, convenient for operation and security personnel to understand.

Segmentation strategies covering various cloud-native scenarios

Intra-cluster network segmentation: segmentation strategies based on Namespace, Label, Controller, IP/CIDR can be set.
Inter-cluster network segmentation: segmentation strategies can be set based on clusters and non-container clusters, and between clusters and external networks.
Pure containers and fat containers: provide different segmentation strategies for pure containers and fat containers.

Provide ‘Alert’ mode to allow users to define strategies with confidence

Provide ‘Alert Only’ mode for workloads, which does not issue the actual segmentation strategies, but simulates the issued situation, and provides alerts when deviations from the strategies are detected. With this mode, you can avoid the impact on business due to the segmentation error.

Comprehensively adapts to cloud-native network environment

Adapts to Underlay, Overlay, Vxlan, Macvlan, Ovs and many other network architectures.

Functional Features
  • Environment adaptation

    More than 50,000 adapts to all types of cloud-native environments and supports multiple networks.

  • Asset visibility

    Visible workloads and network relationships.

  • Wide range of strategies scenarios

    Automatically adapts to east-west and north-south traffic control.

  • Predictable results

    Enables previewing of strategy results and simulating the issuance of segmentation strategies.

  • Abnormal alerting

    Abnormal access alarms and switch control.

  • Easy to implement

    The strategy is automatically generated and can be used for emergency response at critical moment.