Hi [[ session.user.profile.firstName ]]

CloudPassage

  • Date
  • Rating
  • Views
  • Meeting Compliance Regulations in Cloud Environments
    Meeting Compliance Regulations in Cloud Environments Jack Marsal, Director of Product Strategy Recorded: May 30 2018 46 mins
    IT environments have gotten markedly faster, helped by technologies such as public and private clouds, and automation tools. As a result, maintaining compliance with regulations such as PCI, HIPAA, SOC2, etc has become much more difficult if you continue to use old-style compliance thinking and tools.

    In this webinar, you’ll learn the friction points caused by old tools and the new best practices that will allow you to maintain compliance in any environment, no matter how fast-paced.
  • Automated Compliance. Anywhere, Anytime.
    Automated Compliance. Anywhere, Anytime. Cliff Turner, Senior Solutions Architect Recorded: May 30 2018 40 mins
    According to the 2017 Cloud Security Spotlight Report, the top three security headaches for IT and Security Professionals are:
    - Visibility into infrastructure security
    - Compliance
    - Setting consistent security policies

    Enterprises that are subject to regulations such as PCI, HIPAA, SOC2, SOX have traditionally used a variety of IT controls to prove compliance with these regulations. While each regulation is different, the typical requirements include strong access controls, continuous monitoring and logging, and an accurate inventory of systems where sensitive data resides.

    In this webinar, you will learn how automation will be a key to scaling compliance policy assignment, providing visibility, and deploying wherever it is needed - be it in a data center, public cloud, or private cloud.
  • 5 Tips to Secure Docker Containers
    5 Tips to Secure Docker Containers Deepak Munjal, Director of Cloud Security Solutions Recorded: May 30 2018 39 mins
    As with the introduction of any new technology, a majority of organizations fall into the “early adopter” or “intermediate” maturity categories for deploying Dockerized apps in production. In addition to development and deployment best practices, these organizations are also trying to determine how to meet the security and compliance requirements for Docker images and containers.

    In this webinar, we will explore the architectural differences with containers and some best practices to securing them. In particular, we will discuss how security needs to be integrated into your DevOps pipeline to provide a complete solution.
  • DevSecOps and the Cloud Security Gap
    DevSecOps and the Cloud Security Gap Sami Laine, Principal Technologist Recorded: May 30 2018 60 mins
    The rise of continuous development and deployment methods like DevOps have brought speed and quality benefits, but they have put a huge strain on security organizations. Traditional server security tools are not built for automated deployment. They typically require manual configuration before they can be put into production. This slows down the DevOps cycle and increases the risk of configuration errors.

    While some of the DevOps tool sets include basic configuration security checks, this feature by itself is just a small part of all the security controls that most enterprises need. This webinar will cover:

    - How to secure DevOps and cloud deployment
    - Automating and embedding security throughout the process
    - Monitoring and management in production
    - Metrics and audit compliance
  • New Best Practices in Secure Application Development
    New Best Practices in Secure Application Development Deepak Munjal, Director of Cloud Security Solutions Recorded: May 30 2018 63 mins
    Online security threats and defenses are evolving at a breakneck pace, but methods for developing business applications are evolving even faster. This rapidly-changing app environment brings new challenges for information security. Learn how your enterprise can combine emerging app development methods, cloud services capabilities, and new security practices to create a fast and more secure application environment.

    View this webinar from Dark Reading and you will:

    - Learn how application teams can build security into their development processes
    - Get ways to implement new, faster methods for creating and deploying new applications
    - Explore how to detect and eradicate software vulnerabilities in changing applications being deployed over a cloud infrastructure
    - Discover how enterprises use the cloud to speed the implementation of secure application development
  • How to Protect Workloads in the Cloud
    How to Protect Workloads in the Cloud Deepak Munjal, Director of Cloud Security Solutions Recorded: May 30 2018 39 mins
    Modern IT infrastructures are highly elastic, dynamic and automated. But, maintaining continuous visibility and protection over your workloads can be a real challenge. According to a recent report, cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. Traditional security tools don’t work well in these environments, and that consistently worries IT and security professionals.

    Learn how to overcome these limitations and:

    - Provide deep cloud security visibility
    - Automate security for the agile enterprise
    - Reduce cloud attack surface
    - Reduce costs & improve efficiency of cloud security
  • How to Optimize Security Controls for DevOps
    How to Optimize Security Controls for DevOps Sami Laine, Principal Technologist Recorded: May 30 2018 53 mins
    The widespread adoption of DevOps and agile IT delivery systems presents new security challenges. Developers need security tools that are integrated with their build processes so they can test the integrity and security of their applications within minutes. Similarly, infosec managers need security tools that automatically discover and protect new applications as they are delivered via rapid automation and elastic processes. But traditional security tools don’t do either of these things.

    Watch this webinar to learn:

    - Why trying to use traditional security tools in DevOps environments will slow down both developers and security operations
    - Key attributes you should be thinking about to make your security plan future-proof
    - Where can security automation be applied to better align security with DevOps delivery models
  • A Crash Course in Designing a Security Architecture for your Containerized Apps
    A Crash Course in Designing a Security Architecture for your Containerized Apps Amit Gupta, VP Product Management Recorded: May 30 2018 40 mins
    Containerization has been with us for more than a decade, but recently has been exploding in popularity with the introduction of Docker in 2013. Containers create old advantages to new technologies by displacing the inefficiencies of virtualization and bringing speed and scalability to cloud-centric applications.

    Join Cybersecurity expert Amit Gupta, VP Product Management at CloudPassage for this crash course in designing a security architecture for your containerized applications. He will use real world examples to highlight:

    - How containerized applications are different from traditional virtual-machine based applications
    - New security implications and attack vectors
    - A security design pattern for your containerized applications
  • Puppet + CloudPassage = New Approach to Securing DevOps
    Puppet + CloudPassage = New Approach to Securing DevOps Amit Gupta, VP Product Management Recorded: May 30 2018 50 mins
    There was a time when IT infrastructure took months to develop and deploy, and security and compliance teams had time to configure and release security controls in parallel. But if you want to keep up with the pace of business today, that won’t cut it.

    Today’s high-performing teams deploy on demand or multiple times per day, and they can deploy changes to production in less than an hour. Servers themselves may exist for less than an hour. This rapid pace is leaving security teams behind. And the massive gap between code being deployed within hours and security projects taking weeks puts companies at risk.

    It’s time for a new approach to securing DevOps. Watch now and learn how the Puppet module for CloudPassage Halo can help your security teams keep pace with the demands of the modern, agile enterprise.
  • The True Security Risks of IaaS: Don't Worry About the Wrong Things
    The True Security Risks of IaaS: Don't Worry About the Wrong Things Sami Laine, Principal Technologist Recorded: May 30 2018 49 mins
    As more organizations are moving their applications to be hosted with various Infrastructure as a Service providers, security teams have a whole new list of security concerns. But are those worries warranted? Should the perceived loss of control be the at the top of things to worry about?

    View this webinar featuring Sami Laine, Principal Technologist for CloudPassage and James Hilliard, Editor of CSO, as they discuss:

    - Real life data on what your peers are worried about
    - Top security worries that really shouldn’t be any cause for concern
    - Areas to focus resources and prioritize to minimize risk

Embed in website or blog