“By adopting env0, we've cut down infrastructure deployment times from weeks to just 30 minutes. env0 lets us work smoothly and efficiently; it's GitOps made for infrastructure.”
The company is a cybersecurity provider working with top manufacturers to safeguard critical data. The company’s solution is delivered via a cloud-based platform that orchestrates data distribution into customer data lakes, where it’s used for application development.
Crucially, due to the sensitive nature of the data in question, the security solution is deployed within each customer's own cloud perimeter in a series of Kubernetes clusters.
All interactions, including ongoing access and updates, are managed through these clusters, hosted by the customers but securely maintained by the company.
Working with large global manufacturers meant that each of the company’s customers managed its cloud in accordance with its own specific security standards.
This created a variation of scenarios and presented significant operational challenges, necessitating the company to customize processes and services, leading to high costs and inefficiencies.
Moreover, access management also presented a challenge; every time the team connected to a customer’s cloud environment, they had to obtain permissions manually from the respective client.
This lack of consistency forced the team to manually connect to each customer cloud every time they needed to make changes to the cluster.
These dependencies, amplified by the inability to run continuous processes or make changes in bulk, resulted in critical issues that took days and even weeks to fix. Often, by the time the fix was implemented, the team already had new updates they needed to roll out.
Adding to the complexity, the fractured manual process hindered audibility and the implementation of coherent governance processes, needed to better ensure the security of the customer’s sensitive data.
The cybersecurity company approached env0 with a proposition to use its self-hosted Kubernetes agent to securely access and manage resources across all of its customer clusters.
Using env0 as a centralized hub for all configuration changes, the security company managed all interactions with those clusters and rolled out changes in a single swoop.
To achieve that the company implemented the following process:
Additionally, the company utilized env0’s drift detection to identify and resolve potential issues caused by other teams working on the same cloud environment.
The implementation of env0 has brought about several benefits: