Resource Library

Read blogs by Otis, run self-paced labs that teach you how to use Otterize in your browser, or read mentions of Otterize in the media.

  • Kubernetes
  • Zero-trust
  • IBAC
  • Automation
  • Startups
  • Podcasts
  • Network Policy
  • PCI
Dec 11 2024
First Person Platform E04 - Ian Evans on security as an enabler for financial institutions

The fourth episode of First Person Platform, a podcast: platform engineers and security practitioners nerd out with Ori Shoshan on access controls, Kubernetes, and platform engineering.

    • Network
    • Kubernetes
    • Go
    Jan 20 2024
    Network mapper, I see you!

    Learn about the recently developed Otterize network mapper, an open-source tool dedicated to efficiently mapping communication within a Kubernetes cluster by creating functional network maps, focusing on simplicity and effectiveness in revealing pod-to-pod interactions.

    • Kubernetes
    • Network Policy
    • Zero-trust
    • IBAC
    Aug 07 2023
    Using Helm dashboard and intents-based access control for pain-free network segmentation

    Explore an effortless method for Kubernetes network segmentation using Helm Dashboard and the intents operator, enabling a gradual transition to zero trust with step-by-step network policy implementation.

    • IBAC
    • Network Policy
    Apr 24 2023
    Revisiting network policy management

    Explore my journey of revisiting network policy management after three and a half years, reflecting on the challenges faced at Monzo and discovering the evolution towards a solution through intent-based access control for effective service authorization rules.

    • Podcasts
    Apr 23 2023
    Understanding intent-based access control

    How does one understand and define the intent? And more importantly, how to we enforce our intentions with access control? This week's guest is Uri Sarid, he is a man with a long list of credentials and walks us through exactly what is intent-based control and how we can implement it in our organizations.

    • Zero-trust
    • IBAC
    Mar 29 2023
    Least-privilege for Kafka data

    Discover the key challenges and solutions in securing sensitive data within Kafka, emphasizing the significance of least-privilege access control across various use cases such as event-driven architectures, messaging, queuing, and data stream aggregation.

    • Core
    • Startups
    Jul 08 2022
    The essence

    Discover the thrill of "the startup way," exploring the continuous joy of discovery throughout a startup's growth, including aspects like team dynamics, technologies, insights about businesses, and personal revelations.

    • Core
    • Network
    Jul 07 2022
    So you want to deploy mTLS

    Join the journey of a platform engineer securing traffic in a production environment, as they explore implementing mTLS to ensure encryption and authentication in a way that's user-friendly for the whole team.