Skip to the main content.


An increased focus on reducing development cycles and costs, coupled with delivering new capabilities to deployed platforms, is causing system architects of mission critical systems to consider disassembling applications into containers. This offers the opportunity to build and deploy code anywhere you want, including private, hybrid, and public cloud settings. Even though this sounds amazing in principle, there are a number of challenges that need to be considered, especially around security.

The use of containers should not be ignored. However, they need to be embraced into system architectures that are resilient to attack from malware that is incorporated either accidentally or maliciously in the containers or the surrounding orchestration mechanisms.

Here we show a video which contrasts the impact of a container-inspired malware attack on a system running a monolithic software stack as opposed to an architecture where different applications are partitioned and isolated from each other.