Cisco Uses the Isovalent Platform to Secure Cloud Workloads
Cisco, integrates Isovalent to ensure cloud workloads are protected without compromising on performance.
Cisco, integrates Isovalent to ensure cloud workloads are protected without compromising on performance.
But boring is good! Find out why from Adobe's Platform Engineering Team
Learn how Roche worked with Isovalent and deployed Cilium Service Mesh to improve Medical Device Management at the Edge.
Schuberg Philis partnered with Isovalent to support a customer migration from on-prem to cloud with PCI-DSS compliant workloads.
S&P Global was in a transition to a 100% cloud strategy. With the help of Cilium, they were able to break down the silos between networking and developer teams. As a result, S&P Global was able to run its Kubernetes ecosystem securely and reliably in a multi-cloud environment.
Form3 is building out a multi-cloud strategy. To avoid cloud vendor lock-in, they chose Cilium with Kubernetes. It also simplifies daily operations and troubleshooting.
Tietoevry uses Isovalent Enterprise for Cilium with Hubble to have advanced network policies (DNS!), reduce tool sprawl, and get the necessary insights to monitor the various SLAs on their Kubernetes environments.
Learn how VSHN provides services for mission-critical applications reduced their support burden with Isovalent's Enterprise Edition of Cilium
Capital One needed to scale their PaaS to multiple teams - but required secure network isolation, visibility and minimal performance overhead. Isovalent Cilium Enterprise met all requirements and scaled past the iptables limits. Hubble’s additional observability capabilities helped their teams to do more from the start.
Isovalent helped PostFinance to build a scalable Kubernetes platform to run mission-critical banking software in production. By migrating to Cilium as the default CNI for kubernetes, they were able to solve their challenges regarding scale, observability and latency. The network was made visible, improving troubleshooting, enabling forensic analysis and transparently encrypt network traffic.