Debunking Cloud Container Security: 7 Troubles, 7 Triumphs

Debunking Cloud Container Security: 7 Troubles, 7 Triumphs
Learn about the challenges and successes of securing containers in the cloud with this article. Enhance container security by understanding the intricacies of vulnerabilities in cloud containers.
 

Contents

1. The Business Value of Securing Cloud Containers 2. Navigating the Challenges in Cloud Container Security 3. Addressing Container Security Challenges 4. The Future of Securing Cloud Containers

Cloud containers are one of the most popular technologies for developing and deploying cloud-native applications, with benefits like portability, scalability, efficiency, and agility. However, cloud container security poses many challenges as new attack vectors get introduced, increasing their complexity, and requiring different tools and processes.

The GitLab 2022 Global DevSecOps Survey reveals that only 64% of security professionals have a security plan for containers, and many DevOps teams still need a plan for other cutting-edge software technologies.

This article delves into the details of container security and debunks some common cloud security issues and solutions regarding cloud and container security. It shows how to overcome the most prevalent troubles and achieve the best practices for securing containerized workloads. Dive into the latest statistics and trends on cloud container security based on various reports and surveys from industry experts.

Whether just beginning or enhancing expertise in cloud container security, this article will dive into valuable insights and tips on improving security posture and protecting cloud assets from threats. The topics covered are:

  • How to deal with the high number of vulnerabilities in container images and prioritize the ones that matter most
  • How to cope with containers' short lifespan and dynamic nature and conduct container security monitoring and auditing effectively
  • How to secure the communication and network traffic between containers and other components, such as microservices, APIs, and serverless functions
  • How to implement a DevSecOps culture and strategy that integrates security into every stage of the container life cycle
  • How to leverage tools for cloud container security, such as Kubernetes, Docker, Sysdig, Red Hat, GitLab, and more

Learn about cloud container security’s state, challenges, opportunities, best practices, and solutions. It will aid in benchmarking the organization's cloud container security against standard parameters.

According to the Expert Insights 2023 Cloud Security Stats Report, 45% of breaches are cloud-based, and 96% of organizations have experienced significant cloud security challenges when implementing their strategy.

This underscores the significance of cloud-native security and container security for business applications.
 

1. The Business Value of Securing Cloud Containers

Cloud container security involves implementing mechanisms and processes to protect containerized applications and workloads in the cloud. Containers are lightweight application code packages and dependencies that can run on any cloud platform. They offer several benefits for businesses, such as:

1.1 Faster and More Efficient Software Deployment

Containers enable developers to create, test, and deploy applications faster and more reliably, as they can run the same code on different cloud environments without compatibility issues.

1.2 Smaller Attack Surface

Containers isolate applications from each other and the host operating system, reducing the risk of compromise and lateral movement. Containers also have a shorter lifespan than virtual machines, limiting exposure to persistent threats.

1.3 Less Configuration Drift

Containers are immutable, meaning they do not change after they are created. This ensures consistency and reproducibility across different cloud platforms and prevents configuration errors that could lead to security vulnerabilities.
 

2. Navigating the Challenges in Cloud Container Security

Container security is a major concern for many companies and presents several challenges. Some of the challenges include a lack of visibility, expertise, governance, input, and standardization.

There are four generalized use cases that should cover security requirements within the host-container threat landscape:

  • Protecting a container from applications inside it
  • Inter-container protection,
  • Protecting the host from containers, and
  • Protecting containers from a malicious or semi-honest host

The first three use cases utilize software-based solutions that mainly rely on Linux kernel features and Linux security modules, while the last use case relies on hardware-based solutions such as trusted platform modules and trusted platform support. Create robust container security by identifying the pitfalls and challenges, such as:

2.1 Lack of Visibility

Activities inside the container are primarily invisible to security teams, making it difficult to monitor which containers are running, what they are running, or flag network behavior. This means that security teams cannot see what is happening inside the container, such as which processes are running, which files are accessed, or which network connections are established. This makes it hard to detect and prevent malicious activities or unauthorized changes.

2.2 Insecure Images

Containers are built using either a parent or base image, which may contain vulnerabilities that attackers can exploit. These files contain the code and dependencies for creating and running a container. These images may introduce security risks to the container environment if they are not verified or scanned for vulnerabilities. For example, an attacker may compromise an image and insert malicious code or backdoors.

2.3 Privileged Containers

Containers with privileged flags can pose a security risk as they can access sensitive information and system resources. These are containers that have more permissions and access rights than regular containers. They can perform actions that affect the host system or other containers, such as mounting devices, modifying files, or changing network settings. This can be dangerous if the container is compromised or misconfigured, as it may allow an attacker to escalate privileges and cause more damage.

2.4 Unrestricted Communication among Containers

Containers not adequately isolated from one another can communicate freely, potentially allowing attackers to move laterally throughout the container environment. This means that containers can communicate with each other without any restrictions or controls. This can create a large attack surface and allow an attacker to move laterally from one container to another, spreading malware or stealing data. It can also expose sensitive information or services to unauthorized or malicious containers.

2.5 Running Malicious and Rogue Processes in Containers

Attackers may be able to run malicious processes within containers, compromising the security of the entire system. These processes are not supposed to run in a container because they are malicious or unauthorized. They may be injected by an attacker who exploits a vulnerability in the container or the host system or spawned by a legitimate process that is compromised or misbehaving. These processes can consume resources, disrupt operations, or perform malicious actions.

2.6 Misconfigured Containers

Some developers often have a ‘set and forget’ mentality, and there might be default insecure configurations they are not aware of. Containers are often deployed with default or insecure configurations, leaving them vulnerable to attacks. For example, a container may be configured to run with excessive privileges or have weak authentication or encryption settings. Attackers can exploit these misconfigurations to gain unauthorized access or perform malicious actions.

2.7 Vulnerabilities in Container Infrastructure

The Sysdig 2023 Cloud-Native Security and Usage Report shows that 87% of container images have high or critical vulnerabilities, and 54% live for fewer than five minutes.

A container infrastructure stack typically consists of application code, configurations, libraries, and packages built into a container image running inside a container on the host operating system kernel via a container runtime. Vulnerabilities in any of these components can compromise the security of the entire container environment. For example, an attacker may exploit a vulnerability in the container runtime to escape the container and gain access to the host system.
 

3. Addressing Container Security Challenges

Prioritizing overcoming cloud container security challenges helps fortify container security and create robust business continuity. Here are some of the best solutions to help mitigate them:

3.1 Visibility

Monitor and audit container activities with tools such as network connections, file accesses, and process executions. Implement monitoring and logging mechanisms to detect and respond to suspicious or anomalous events. Scan and inventory container images and configurations with tools to identify vulnerabilities and misconfigurations.

Effectively prioritizing the vulnerabilities is easy by following a risk-based approach by tracking parameters such as CVE severity, CVSS score, and CVE exploitability and actively running vulnerable workloads. Another system is to follow a three-step process to create secure container images:

  • Securing code and its dependencies
  • Building up a minimal base image from a trusted source
  • Managing the tools and packages added to container images throughout the development lifecycle


3.2 Secure Images

Use trusted and verified sources, such as official repositories or registries, to obtain container images. Scan container images regularly for vulnerabilities and patch them as soon as possible. Enforce policies and prevent unauthorized or untrusted images from running in the container environment with the help of cloud security management tools.

3.3 Least Privileged Containers

Follow the principle of least privilege and run containers with the minimum permissions and access rights required for their functionality. Avoid running containers as root or with privileged flags unless necessary. Restrict or limit the capabilities of containers and isolate them from the host system and other containers using tools.

3.4 Encrypt Container Communication

Implement network segmentation and isolation for containers, such as firewalls, network policies, or service meshes. Define and enforce rules for allowing or denying communication between containers based on their roles, functions, or labels. Encrypt network traffic between containers using protocols such as TLS or HTTPS.

3.5 Prevent Malicious and Rogue Processes in Containers

Detect and block malicious processes from running in containers using tools such as antivirus, anti-malware, or intrusion prevention systems. Perform behavioral analysis and anomaly detection with tools to identify rogue strategies deviating from standard patterns. Sandbox or quarantine containers that are compromised or infected with the help of appropriate tools.

3.6 Automated Container Configuration

Check and validate container configurations against security best practices and standards, such as CIS benchmarks or NIST guidelines, with tools such as Puppet. These automate container configuration management and enforcement, such as configuration management systems or policy engines. Other tools, such as PingSafe, Datadog Cloud SIEM, Anchore, and Sophos Cloud Native Security, provide feedback and recommendations for improving container security posture, such as security scanners or scorecards.

3.7 Vulnerabilities in Container Infrastructure

Utilize tools such as Snyk that can scan and patch the components of the container infrastructure stack, such as the application code, libraries, packages, container runtime, kernel, and host operating system. Isolate or protect the container infrastructure from external attacks with tools such as encryption, authentication, authorization, or encryption at rest or in transit. Update or replace the container infrastructure components with tools without disrupting the application functionality, such as rolling updates or blue-green deployments. These minimize downtime and allow for easy rollback.
 

4. The Future of Securing Cloud Containers

Securing cloud containers has become a top priority for cloud-native applications. Cloud security trends  aim to leverage it to safeguard cloud containers effectively.

  • Containers are highly portable code execution environments that rely on a shared kernel, which poses some security challenges and complexities.
  • Blockchain, data loss prevention, and data classification are some of the trends that will define the future of cloud security.
  • Security teams need solutions that enable, rather than hinder, the entire lifecycle of containers and Kubernetes, from building to deploying to running.
  • To ensure the safety and protection of sensitive data, security solutions should integrate seamlessly into existing development workflows and support role-based access controls, transparency, and accountability.
  • In order to maintain the highest level of security, security solutions should also provide scanning for vulnerabilities, applying security policies, and container security monitoring for anomalies in container environments.

While securing cloud container environments can be challenging at times, tools and technologies offer security teams enhanced protection. In essence, the future of securing containers and Kubernetes in 2023 and beyond is extremely bright. The cloud-native landscape increasingly relies on containers to build, deploy, and run production-ready workloads. This raises the need for security teams to work with cloud container security solutions that enable, rather than hinder, their full lifecycles.

Spotlight

Intuit

We build intuitive web, mobile, and cloud solutions that enable 42 million consumers and small businesses around the world to take charge of their money and do what they love. Learn how your ideas will help shape how we grow and what we do in an agile environment with fast-moving teams and experimentation.

OTHER ARTICLES
Cloud App Development, Cloud Security, Cloud App Management

What Is Cloud-Native and Why Does it Matter for CI

Article | July 31, 2023

Continuous intelligence (CI) relies on the real-time analysis of streaming data to produce actionable insights in milliseconds to seconds. Such capabilities have applications throughout a business. In today’s dynamic marketplace, new CI applications that use data from various sources at any given time might be needed on very short notice.The challenge is how to have the flexibility to rapidly develop and deploy new CI applications to meet fast-changing business requirements. A common approach employed today is to use a dynamic architecture that delivers access to data, processing power, and analytics capabilities on demand. In the future, solutions also will likely incorporate artificial intelligence applications to complement the benefits of traditional analytics. Increasingly, cloud-native is the architecture of choice to build and deploy AI-embedded CI applications. A cloud-native approach offers benefits to both the business and developers. Cloud-native applications or services are loosely coupled with explicitly described dependencies.

Read More
Cloud Security, Cloud Infrastructure Management

Why Microsoft Should Spinoff Its Cloud Business

Article | July 11, 2023

Microsoft currently features old-school solutions that are growing relatively slowly (Office and Windows) and new cloud solutions that are growing tremendously (Dynamics 365 and Azure). If the company stays in its current form, Microsoft stock will keep steadily advancing. But because the company’s total top and bottom lines are never going to increase much more than 30% or 35% per year, the shares are never going to deliver truly huge returns. But that would change if the company was to spin off its rapidly growing cloud businesses. In such a scenario, the current owners of Microsoft stock would receive shares in a cutting edge cloud services company (let’s call it Azure), and shares in a company focused on providing old, mostly PC-based software to businesses and consumers.

Read More
Cloud App Development, Cloud Security, Cloud App Management

Intelligence Giant Upgrading its Cloud Technology

Article | June 21, 2023

With the huge amounts of data in all fields, a future in the cloud is imperative to help deal with this explosion of data, especially in the field of intelligence technology. This is the reason why the US Central Intelligence Agency is updating its cloud technology. The agency has recently released a draft request for proposal for its Commercial Cloud Enterprise contract.The C2E tens of billions contract will be a multi-award commercial cloud computing contract with a five-year base period and two five-year options for a period of performance of up to 15 years, according to nextgov.com.In a March 2019 presentation by the Directorate of Digital Innovation, a division of the CIA, the department outlined its vision for C2E. It would be broad and include infrastructure, platform and software cloud services supporting a broad range of users, with a variety of security clearances and a worldwide presence, as reported by techcrunch.com. The principal C2E Program objective is to acquire cloud computing services directly from commercial cloud service providers with established records for innovation and operational excellence in cloud service delivery for a large customer base,the department stated in the presentation.Apparently, the agency prefers to avoid all the attention that the Pentagon’s JEDI cloud procurement process got, and quietly go about its business.

Read More

AWS tags US$235 million to expand its cloud infrastructure in Latin America

Article | February 10, 2020

Amazon Web Services (AWS) is raising its stake on cloud computing infrastructure in Latin America. Proof of this is that the IT company will use R$1 billion (around US$235 million) to expand its data center in Sao Paulo. These millions will be used for its Data Processing Center located in that part of Brazil. In addition, a portion of these US$235 million will also be used to increase the services it offers to both public and private parties.The move gives reason to suggest that AWS is upping the ante in the future of startups and tech in the region that rely on cloud services to develop their own products.It launched its cloud center in Brazil in 2011 but it’ll be getting some beefing up thanks to these funds. Moreover, AWS has two Edge networks in São Paulo and two in Rio de Janeiro. As well as one in each of the following cities: Bogotá (Colombia), Buenos Aires (Argentina), and Santiago (Chile).The objective of all of this is to be the region’s prime provider of cloud infrastructure and beat out its competition AKA, Google Cloud Platform and Microsoft’s Azure.

Read More

Spotlight

Intuit

We build intuitive web, mobile, and cloud solutions that enable 42 million consumers and small businesses around the world to take charge of their money and do what they love. Learn how your ideas will help shape how we grow and what we do in an agile environment with fast-moving teams and experimentation.

Related News

Cloud Infrastructure Management

The Manufacturing Sector Experiences More Attacks in the Cloud than Any Other Industry

PR Newswire: | January 19, 2024

Netwrix, a cybersecurity vendor that makes data security easy, today revealed additional findings for the manufacturing sector from its survey of 1,610 IT and security professionals across more than 100 countries. According to the survey, 64% of companies in the manufacturing sector suffered a cyberattack during the preceding 12 months, which is similar to the finding among organizations overall (68%). However, it turned out that the manufacturing sector experiences more cloud infrastructure attacks than any other industry surveyed. Among manufacturing companies that detected an attack, 85% spotted phishing in the cloud compared to only 58% across all verticals; 43% faced user account compromise in the cloud as opposed to 27% among all industries; and 25% dealt with data theft by hackers in the cloud compared to 15% for organizations overall. "The manufacturing sector relies heavily on the cloud to work with their supply chain in real time. This makes their cloud infrastructure a lucrative target for attackers — infiltrating it enables them to move laterally and potentially compromise other linked organizations, as happened to one the world's top meat processing companies. Credential compromise or malware deployed via a phishing email is just the beginning of the attack," says Dirk Schrader, VP of Security Research at Netwrix. "The attack surface in the cloud is always expanding, so it's critical for manufacturing companies to adopt a defense-in-depth approach," adds Ilia Sotnikov, Security Strategist at Netwrix. "First, they must rigorously enforce the principle of least privilege to limit access to sensitive data, which ideally includes just-in-time access to eliminate unnecessary entry points for adversaries. They also need to gain deep visibility into when and how critical data in the cloud is being used so that IT teams can promptly spot potential threats. Finally, they need to be prepared to minimize the damage from incidents by having a comprehensive response strategy that is regularly exercised and updated." To learn more about security trends, check out the complete 2023 Hybrid Security Trends Report. About Netwrix Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact. More than 13,500 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.

Read More

Cloud Storage

TRG Screen Announces Acquisition of Xpansion for Reference Data Usage Management

PR Newswire: | January 25, 2024

TRG Screen, the leading provider of enterprise subscription spend and usage management software, today announced it has acquired Xpansion, the leading provider of cloud-based solutions for reference data usage monitoring in the financial services industry. The acquisition of Xpansion will further solidify TRG Screen's position as a global market leader in market data management solutions. Xpansion – established in 2013 – is focused on empowering data operations teams to proactively manage their usage, control costs and optimize data workflows. Xpansion's offerings include Xmon, Xprocess and Xplore, and provide real-time analytics, giving clients unprecedented transparency, visibility and control into their reference data usage. This deal consolidates TRG Screen's unique position as the only provider of enterprise subscription management capabilities spanning the whole spectrum of market data optimization, from spend and inventory tracking, through to usage and enquiry management, exchange reporting and compliance. "Xpansion and TRG Screen have been partners for many years. Bringing Xpansion into the TRG Screen family is a very logical next step for both companies, given our strong relationship and shared view that the industry demand for integrated usage management solutions is going to continue to grow," said TRG Screen CEO Leigh Walters. "Xpansion is an established firm with excellent customer satisfaction and retention, and highly experienced and industry respected leadership. We are very excited at the opportunities this acquisition brings." "We are thrilled to be joining TRG Screen," said Xpansion co-founder and CEO Amjad Zoghbi. "Reference data usage is one of the most complex aspects of market data management, and managing it correctly is essential to maintaining contractual compliance and ensuring clients are right-sizing their usage based on actual consumption and business need. I'm very pleased that Xpansion's customers, and team, will now be part of the best-of-breed solution with the industry's leading provider of market data management solutions." The acquisition demonstrates TRG Screen's ongoing commitment to servicing the needs of market data consumers, vendors and exchanges. Financial terms of the transaction were not disclosed. About TRG Screen TRG Screen is the leading provider of enterprise subscription management solutions. Founded in 1998, TRG Screen is uniquely differentiated by its ability to monitor both spend and usage of data and information services including market data, research, software licenses, consulting and other corporate expenses. TRG Screen's solutions provide its customers with full transparency into their vendor relationships and their subscription spend and usage, enabling them to optimize their enterprise subscriptions. TRG acquired Priory Solutions in 2016, Screen Group in 2018, Axon Financial Systems in 2019, Market Data Insights in 2020, and Jordan & Jordan's Market Data Reporting (MDR) business in 2021 and with these acquisitions is now positioned as the global market leader in the financial, legal, and professional services markets. TRG Screen's product portfolio includes subscription spend, usage, enquiry and compliance solutions. For more information visit trgscreen.com. Follow TRG Screen on LinkedIn, @TRG Screen, and on Twitter, @trgscreen. About Xpansion Xpansion delivers next-generation reference data solutions that empower financial institutions to streamline their reference data operations, reduce costs, enhance data quality, and improve data discovery. With a focus on customer satisfaction, continuous innovation and quick time to value, Xpansion is a trusted partner for financial institutions in the buy- and sell-side as well as solution providers in the industry.

Read More

Cloud App Management

DriveNets and Acacia Announce Joint Network Cloud 400G ZR/ZR+ Solution

PR Newswire | January 16, 2024

DriveNets – a leader in innovative networking solutions – and Acacia today announced the completion of integrating multiple Acacia 400G ZR/ZR+ optical modules with DriveNets' Network Cloud platform. The combined DriveNets-Acacia solution will ensure quick adoption of this innovative disaggregated networking solution and accelerate large-scale network rollouts. DriveNets and Acacia have joint Tier-1 operator customers who will deploy the joint solution. Last September, DriveNets announced that Network Cloud was the first Disaggregated Distributed Chassis/Backbone Router (DDC/DDBR) to support ZR/ZR+ optics as native transceivers that can be inserted into any Network Cloud-supported white boxes. The combined Acacia-DriveNets solution announced today adds the initial collaboration between the companies, offering several benefits: The joint solution will deliver significant simplicity and cost savings by collapsing Layer-1 to Layer-3 communications into a single platform. The use of 400ZR/ZR+ eliminates the need for standalone optical transponders, lowering the number of boxes in the solution, and reducing operational-overhead, floor-space, and power. DriveNets and Acacia worked together to ensure that the DriveNets NOS (DNOS) supports the 400ZR/ZR+ modules beyond simply plugging them into the box. The collaboration ensures the 400ZR/ZR+ modules can be tunable, configurable, and manageable by DriveNets Network Cloud software. This integration also goes beyond interoperability validation. DriveNets Network Cloud offers full software support for the Acacia modules, including configuration (channel and power), monitoring, and troubleshooting for Acacia Bright 400ZR+ transceivers with transmit power greater than +1dBm. "Today's announcement is further proof of the growth of disaggregated networking solutions and demonstrates that more operators are looking for open solutions that will allow them to mix elements from multiple vendors and avoid being locked to a specific end-to-end vendor solution," said Nir Gasko, Vice President, Global Strategic Alliances for DriveNets. "By collaborating with Acacia, we enable our joint customers to quickly adopt cutting-edge technologies and evolve their networks faster." "Partnering with DriveNets on this joint solution will allow network operators to deploy Acacia's high-volume standard-based coherent pluggable portfolio in open disaggregated networks with less effort," said Fenghai Liu, Senior Director of Product Line Management for Acacia. "Through this collaboration customers can achieve significant capex and opex savings with router-based coherent optics." DriveNets Network Cloud is being adopted by more Tier-1 operators around the world. By partnering with world-class providers like Acacia, the company continues to expand its ecosystem to support its customers' desire to mix-and-match hardware and software from multiple vendors. Learn more about DriveNets here. About DriveNets DriveNets is a leader in high-scale disaggregated networking solutions. Founded in 2015, DriveNets modernizes the way service providers, cloud providers and hyperscalers build networks, streamlining network operations, increasing network performance at scale, and improving their economic model. DriveNets' solutions – Network Cloud and Network Cloud-AI – adapt the architectural model of hyperscale cloud to telco-grade networking and support any network use case – from core-to-edge to AI networking – over a shared physical infrastructure of standard white-boxes, radically simplifying the network's operations and offering telco-scale performance and reliability with hyperscale elasticity. DriveNets' solutions are currently deployed in the world's largest networks.

Read More

Cloud Infrastructure Management

The Manufacturing Sector Experiences More Attacks in the Cloud than Any Other Industry

PR Newswire: | January 19, 2024

Netwrix, a cybersecurity vendor that makes data security easy, today revealed additional findings for the manufacturing sector from its survey of 1,610 IT and security professionals across more than 100 countries. According to the survey, 64% of companies in the manufacturing sector suffered a cyberattack during the preceding 12 months, which is similar to the finding among organizations overall (68%). However, it turned out that the manufacturing sector experiences more cloud infrastructure attacks than any other industry surveyed. Among manufacturing companies that detected an attack, 85% spotted phishing in the cloud compared to only 58% across all verticals; 43% faced user account compromise in the cloud as opposed to 27% among all industries; and 25% dealt with data theft by hackers in the cloud compared to 15% for organizations overall. "The manufacturing sector relies heavily on the cloud to work with their supply chain in real time. This makes their cloud infrastructure a lucrative target for attackers — infiltrating it enables them to move laterally and potentially compromise other linked organizations, as happened to one the world's top meat processing companies. Credential compromise or malware deployed via a phishing email is just the beginning of the attack," says Dirk Schrader, VP of Security Research at Netwrix. "The attack surface in the cloud is always expanding, so it's critical for manufacturing companies to adopt a defense-in-depth approach," adds Ilia Sotnikov, Security Strategist at Netwrix. "First, they must rigorously enforce the principle of least privilege to limit access to sensitive data, which ideally includes just-in-time access to eliminate unnecessary entry points for adversaries. They also need to gain deep visibility into when and how critical data in the cloud is being used so that IT teams can promptly spot potential threats. Finally, they need to be prepared to minimize the damage from incidents by having a comprehensive response strategy that is regularly exercised and updated." To learn more about security trends, check out the complete 2023 Hybrid Security Trends Report. About Netwrix Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact. More than 13,500 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.

Read More

Cloud Storage

TRG Screen Announces Acquisition of Xpansion for Reference Data Usage Management

PR Newswire: | January 25, 2024

TRG Screen, the leading provider of enterprise subscription spend and usage management software, today announced it has acquired Xpansion, the leading provider of cloud-based solutions for reference data usage monitoring in the financial services industry. The acquisition of Xpansion will further solidify TRG Screen's position as a global market leader in market data management solutions. Xpansion – established in 2013 – is focused on empowering data operations teams to proactively manage their usage, control costs and optimize data workflows. Xpansion's offerings include Xmon, Xprocess and Xplore, and provide real-time analytics, giving clients unprecedented transparency, visibility and control into their reference data usage. This deal consolidates TRG Screen's unique position as the only provider of enterprise subscription management capabilities spanning the whole spectrum of market data optimization, from spend and inventory tracking, through to usage and enquiry management, exchange reporting and compliance. "Xpansion and TRG Screen have been partners for many years. Bringing Xpansion into the TRG Screen family is a very logical next step for both companies, given our strong relationship and shared view that the industry demand for integrated usage management solutions is going to continue to grow," said TRG Screen CEO Leigh Walters. "Xpansion is an established firm with excellent customer satisfaction and retention, and highly experienced and industry respected leadership. We are very excited at the opportunities this acquisition brings." "We are thrilled to be joining TRG Screen," said Xpansion co-founder and CEO Amjad Zoghbi. "Reference data usage is one of the most complex aspects of market data management, and managing it correctly is essential to maintaining contractual compliance and ensuring clients are right-sizing their usage based on actual consumption and business need. I'm very pleased that Xpansion's customers, and team, will now be part of the best-of-breed solution with the industry's leading provider of market data management solutions." The acquisition demonstrates TRG Screen's ongoing commitment to servicing the needs of market data consumers, vendors and exchanges. Financial terms of the transaction were not disclosed. About TRG Screen TRG Screen is the leading provider of enterprise subscription management solutions. Founded in 1998, TRG Screen is uniquely differentiated by its ability to monitor both spend and usage of data and information services including market data, research, software licenses, consulting and other corporate expenses. TRG Screen's solutions provide its customers with full transparency into their vendor relationships and their subscription spend and usage, enabling them to optimize their enterprise subscriptions. TRG acquired Priory Solutions in 2016, Screen Group in 2018, Axon Financial Systems in 2019, Market Data Insights in 2020, and Jordan & Jordan's Market Data Reporting (MDR) business in 2021 and with these acquisitions is now positioned as the global market leader in the financial, legal, and professional services markets. TRG Screen's product portfolio includes subscription spend, usage, enquiry and compliance solutions. For more information visit trgscreen.com. Follow TRG Screen on LinkedIn, @TRG Screen, and on Twitter, @trgscreen. About Xpansion Xpansion delivers next-generation reference data solutions that empower financial institutions to streamline their reference data operations, reduce costs, enhance data quality, and improve data discovery. With a focus on customer satisfaction, continuous innovation and quick time to value, Xpansion is a trusted partner for financial institutions in the buy- and sell-side as well as solution providers in the industry.

Read More

Cloud App Management

DriveNets and Acacia Announce Joint Network Cloud 400G ZR/ZR+ Solution

PR Newswire | January 16, 2024

DriveNets – a leader in innovative networking solutions – and Acacia today announced the completion of integrating multiple Acacia 400G ZR/ZR+ optical modules with DriveNets' Network Cloud platform. The combined DriveNets-Acacia solution will ensure quick adoption of this innovative disaggregated networking solution and accelerate large-scale network rollouts. DriveNets and Acacia have joint Tier-1 operator customers who will deploy the joint solution. Last September, DriveNets announced that Network Cloud was the first Disaggregated Distributed Chassis/Backbone Router (DDC/DDBR) to support ZR/ZR+ optics as native transceivers that can be inserted into any Network Cloud-supported white boxes. The combined Acacia-DriveNets solution announced today adds the initial collaboration between the companies, offering several benefits: The joint solution will deliver significant simplicity and cost savings by collapsing Layer-1 to Layer-3 communications into a single platform. The use of 400ZR/ZR+ eliminates the need for standalone optical transponders, lowering the number of boxes in the solution, and reducing operational-overhead, floor-space, and power. DriveNets and Acacia worked together to ensure that the DriveNets NOS (DNOS) supports the 400ZR/ZR+ modules beyond simply plugging them into the box. The collaboration ensures the 400ZR/ZR+ modules can be tunable, configurable, and manageable by DriveNets Network Cloud software. This integration also goes beyond interoperability validation. DriveNets Network Cloud offers full software support for the Acacia modules, including configuration (channel and power), monitoring, and troubleshooting for Acacia Bright 400ZR+ transceivers with transmit power greater than +1dBm. "Today's announcement is further proof of the growth of disaggregated networking solutions and demonstrates that more operators are looking for open solutions that will allow them to mix elements from multiple vendors and avoid being locked to a specific end-to-end vendor solution," said Nir Gasko, Vice President, Global Strategic Alliances for DriveNets. "By collaborating with Acacia, we enable our joint customers to quickly adopt cutting-edge technologies and evolve their networks faster." "Partnering with DriveNets on this joint solution will allow network operators to deploy Acacia's high-volume standard-based coherent pluggable portfolio in open disaggregated networks with less effort," said Fenghai Liu, Senior Director of Product Line Management for Acacia. "Through this collaboration customers can achieve significant capex and opex savings with router-based coherent optics." DriveNets Network Cloud is being adopted by more Tier-1 operators around the world. By partnering with world-class providers like Acacia, the company continues to expand its ecosystem to support its customers' desire to mix-and-match hardware and software from multiple vendors. Learn more about DriveNets here. About DriveNets DriveNets is a leader in high-scale disaggregated networking solutions. Founded in 2015, DriveNets modernizes the way service providers, cloud providers and hyperscalers build networks, streamlining network operations, increasing network performance at scale, and improving their economic model. DriveNets' solutions – Network Cloud and Network Cloud-AI – adapt the architectural model of hyperscale cloud to telco-grade networking and support any network use case – from core-to-edge to AI networking – over a shared physical infrastructure of standard white-boxes, radically simplifying the network's operations and offering telco-scale performance and reliability with hyperscale elasticity. DriveNets' solutions are currently deployed in the world's largest networks.

Read More

Events