Tigera Streamlines the Deployment and Implementation of Runtime Security and Observability for Kubernetes

Tigera, the creator of Project Calico, is offering new features of Calico Enterprise and Calico Cloud, extending the products’ Runtime Threat Defense capabilities. 

Through Calico, Tigera equips security, DevOps, and platform engineering teams with the deep visibility and monitoring required to bolster the security of their container platforms and containerized applications, according to the company.

The latest updates to Calico build on this, with improved capabilities to observe and secure workload communication with Calico policies, deploy and operationalize runtime threat detection, and monitor workloads for potentially malicious activity.

With the updates to Calico, Tigera has added new entry points to view flow logs directly from the endpoints listing as well as View Policy pages within the product’s user interface. Instead of switching between different dashboards, users can now easily visualize which endpoints are involved in denied traffic, filter these workloads, and view associated flows. 

Enhancements to the View Policy pages also offer users a comprehensive visualization of the flows that have recently been evaluated by that policy, to help make sense of denied traffic or updates to rules. These visualization improvements will help users shorten troubleshooting time and speed up resolution, according to the company.

Additionally, this Calico update introduces enhancements to security events that help operationalize runtime threat detection. 

Tigera is launching a new dashboard, which summarizes and correlates security events, helping practitioners understand how events map across namespaces, MITRE techniques, event types, and attack phases. Overall, this allows users to quickly make sense of potential threats, engage the right stakeholders, and start the incident response and investigation process.

Managing ‌alert fatigue for security events has also been bolstered. Calico has new features that allow users to create custom exceptions with varying levels of scope, from excluding an entire namespace to a specific deployment or workload. These capabilities enable operators to fine-tune their runtime threat detection mechanisms currently deployed and focus investigations and response on their critical applications and infrastructure.

In addition, Calico now automatically performs a geolocation lookup for security events that contain external IP addresses to quickly distinguish between legitimate and malicious traffic. With this release, security events are also available via a webhook, enabling quick and easy direct integration with 3rd-party tools such as Jira and Slack, as well as supporting integration with other HTTP endpoints preferred by organizations. 

Calico’s distributed workload-centric WAF was built to address this attack vector and protect service-to-service communication. 

Calico’s workload-centric WAF can now be deployed to the ingress gateway at the edge of the cluster to protect your entire cluster from OWASP Top 10 attacks. This enhancement delivers the industry’s most comprehensive WAF solution for containers and Kubernetes, according to the company.  

"Modern organizations rely on containerized applications to run business operations and deliver core products and services,” said Amit Gupta, chief product officer at Tigera. “These latest updates to Calico underpin our ongoing commitment to providing organizations with a unified view of their containerized environments. We continue to innovate to provide comprehensive monitoring, analysis and visibility into potential threats to enable quick identification and mitigation of risks, and proactively enhance container and Kubernetes security posture.”

For more information about this news, visit