Summary is AI-generated, newsdesk-reviewed
  • Zero Networks enhances Kubernetes microsegmentation for improved security and visibility, easing DevOps collaboration.
  • New solutions offer automated workload discovery, seamless existing workflow integration, and granular cluster insights.
  • Identity-aware approach aligns with CISA guidance, winning multiple 2025 InfoSec Innovators Awards.

Zero Networks has announced new capabilities for managing Kubernetes microsegmentation, aimed at enhancing security teams' control and oversight without the need for specialised DevOps knowledge.

By employing native Kubernetes tools along with eBPF technology, the solution provides a lightweight and unobtrusive deployment.

This enables organisations to maintain secure scaling operations while counteracting lateral movements.

Comprehensive visibility and ease of use

Zero Networks has developed a user-friendly security tool tailored for Kubernetes environments

In light of statistics indicating that 93% of organisations are engaged with Kubernetes — through either deployment, trial, or evaluation stages — and 42% prioritising security in container strategies, Zero Networks has developed a user-friendly security tool tailored for Kubernetes environments.

Their strategy offers extensive visibility to security teams without necessitating in-depth Kubernetes knowledge and aligns with DevOps best practices, ensuring continuous development without security-induced hindrances.

Yuval Goldberg, VP of Product Management at Zero Networks, remarked, “Security shouldn’t inhibit the speed of business, and Zero’s approach to microsegmenting Kubernetes is a robust technological advancement for teams frustrated by historically high friction, intrusive alternatives.”

Compatibility with existing systems

The company’s microsegmentation approach is designed to fit seamlessly into current Kubernetes operations, unlike legacy methods that often involve complex setups and partial coverage.

This compatibility allows Zero Networks to integrate without affecting ongoing cluster applications. The platform offers security teams an immediate advantage through complete visibility into cluster activities and network policy insights, ensuring compliance without business disruption, all accessible via a single interface.

Key features of Kubernetes integration

  • Automated discovery of workloads, services, and dependencies within Kubernetes clusters
  • Full visibility into all traffic — including east-west, north-south, and inter-cluster interactions
  • Insight into user-defined network policies for immediate exposure assessment
  • Centralised management for segmentation rule enforcement from a unified control point

Identity-aware microsegmentation

Zero Networks provides identity-aware microsegmentation that can be deployed in a matter of days

Zero Networks provides identity-aware microsegmentation that can be deployed in a matter of days.

The deterministic automation engine simplifies the process, removing traditional barriers to implementation. The solution is in line with CISA’s latest zero trust microsegmentation guidance.

Recently, Zero Networks received accolades at the 2025 Top InfoSec Innovators Awards for categories including Microsegmentation and Zero Trust innovation, showcasing the breadth of their zero trust security solutions aimed at all sizes of organisations to mitigate risks like lateral movement and ransomware.

Zero trust security and industry recognition

These awards highlight Zero Networks’ extensive security offerings that facilitate prevention of lateral movement and ransomware containment in Kubernetes settings without additional operational complications.

Currently, Zero Networks is conducting a four-week webinar series, Containment Island, offering security professionals the chance to win prizes, including a trip to the Four Seasons Bahamas, while earning credits and learning from cybersecurity leaders. The competition remains open until the winner is declared on November 11th.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...