Skip to main content
Application Containerization

Application Containerization


Application Containerization

Application containerization enables a logical packaging system in which applications can be abstracted from the environment (including the operating system) in which they actually run.

Containerization allows applications to be developed once and easily deployed across virtually any environment regardless of operating system, virtual machine or bare metal, on-prem data centers or public cloud.  This provides obvious advantages in terms of application flexibility and agility. Containerization can also provide performance and scale improvements relative to virtual machine approaches.  However, containers also create their own unique set of unique security considerations.

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers. 

Explore the Dictionary

Related Assets

October 22, 2014

How to Reduce Attack Surface

An effective strategy to help protect your organization is to reduce the noise, allowing for easier detection of an exploit; while at the same time in...

See Details

May 03, 2017

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 18

Manage the security lifecycle of all in-house developed and acquired software in order to prevent, detect and correct security weaknesses.

See Details

March 14, 2017

Secure SDLC Lessons Learned: #1 Application Catalog

Building an application catalog is a critical step towards maintaining governance over a secure SDLC program. The primary purposes of the catalog are ...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.