5
10
0

What is Cilium?

Open source software for providing and transparently securing network connectivity and loadbalancing between application workloads such as application containers or processes.
Cilium is a tool in the Security category of a tech stack.

Who uses Cilium?

Companies

Developers

Cilium Integrations

Docker, Apache Mesos, Kafka, Kubernetes, and gRPC are some of the popular tools that integrate with Cilium. Here's a list of all 6 tools that integrate with Cilium.

Why developers like Cilium?

Here’s a list of reasons why companies and developers use Cilium
Top Reasons
Be the first to leave a pro

Cilium's Features

  • Identity Based Security - Cilium visibility and security policies are based on the container orchestrator identity (e.g., Kubernetes labels). Never again worry about network subnets or container IP addresses when writing security policies, auditing, or troubleshooting.
  • Blazing Performance - BPF is the underlying Linux superpower to do the heavy lifting on the datapath by providing sandboxed programmability of the Linux kernel with incredible performance.
  • API-Protocol Visibility + Security - Traditional firewalls only see and filter packets based on network headers like IP address and ports. Cilium can do this as well, but also understands and filters the individual HTTP, gRPC, and Kafka requests that stitch microservices together.
  • Designed for Scale - Cilium was designed for scale, with no node-to-node interactions required when new pods are deployed, and all coordination through a highly scalable key-value store.

Cilium Alternatives & Comparisons

What are some alternatives to Cilium?
Weave
Weave can traverse firewalls and operate in partially connected networks. Traffic can be encrypted, allowing hosts to be connected across an untrusted network. With weave you can easily construct applications consisting of multiple containers, running anywhere.
Istio
Istio is an open platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. Istio's control plane provides an abstraction layer over the underlying cluster management platform, such as Kubernetes, Mesos, etc.
Let's Encrypt
Let’s Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
Authy
We make the best rated Two-Factor Authentication smartphone app for consumers, a Rest API for developers and a strong authentication platform for the enterprise.
Spring Security
It is a framework that focuses on providing both authentication and authorization to Java applications. The real power of Spring Security is found in how easily it can be extended to meet custom requirements.
See all alternatives

Cilium's Followers
10 developers follow Cilium to keep up with related blogs and decisions.
BenedicteF
Thomas Graf
Camilo -
MohammadAsh15
Ives Stoddard
Ignacio Millán
anjakammer
David Galoyan
csechuan
Nicolas Marshall