Hi [[ session.user.profile.firstName ]]

The Container Security Channel

  • Date
  • Rating
  • Views
  • Running Workloads with Privileges = Running with Scissors
    Running Workloads with Privileges = Running with Scissors Liz Rice Technology Evangelist, Aqua Security Recorded: May 31 2018 36 mins
    This webinar is an encore/expanded version of Liz Rice’s keynote address from KubeCon in Copenhagen held May 2018

    During this webinar we’ll explore some common risks that many users are - often unknowingly - taking with their cloud native deployment by running workloads with more privileges than they need.

    Liz Rice, Container Technology Evangelist, will demonstrate how containers run as root by default, and show by example why this is something you should try to avoid.
  • Improve Security with Automated Image Scanning Through CI/CD
    Improve Security with Automated Image Scanning Through CI/CD Liz Rice Technology Evangelist, Aqua Security Recorded: May 25 2018 25 mins
    When it comes to securing an application deployed on Kubernetes, automation through a CI/CD pipeline is key. Using cloud-native security tools that hook right into Jenkins or your favorite CI/CD tool, enterprise security teams can set policies for developers who are building container images. The pipeline enforces those policies through automated vulnerability scanning of each image during the build process. Developers only deploy images that the security team is confident in because they’ve been scanned.
  • Protect your Containerized Applications from Build to Production
    Protect your Containerized Applications from Build to Production Tsvi Korren - Chief Solutions Architect at Aqua Security Recorded: May 11 2018 31 mins
    This webinar focuses on how to secure container workloads across any IT environment while maintaining high availability of services.

    We will cover the unique security challenges of such environments and how to protect containerized applications from build to production using container-native security controls, secrets and access management according to security and compliance mandates (e.g. CIS, NIST).

    This webinar is mainly intended for:

    ●Security admins and architects who want to learn about the risks and benefits of using containers, and how to secure them efficiently
    ●Application development teams and DevOps teams who want to deliver apps that are more secure out of the gate
  • Red Hat OpenShift Enforcing Immutability & Least Privilege to Secure Containers
    Red Hat OpenShift Enforcing Immutability & Least Privilege to Secure Containers Tsvi Korren - Chief Solutions Architect at Aqua Security Recorded: May 1 2018 48 mins
    Synopsis:
    In this webinar, Tsvi Korren, Chief Solutions Architect at Aqua Security, will explain and demonstrate how an approach that enforces immutability and least privilege can secure applications in an active container environment.

    One of the benefits of using containers, especially in microservices-based applications, is they make it easier to secure applications via runtime immutability—or never-changing—and applying least-privilege principles that limit what a container can do.

    With immutability, every attempt to change the runtime environment is interpreted as an anomaly. And, thanks to containers’ simplicity, it is easier to predict their behavior in the application context and create a tight security envelope, allowing them to perform only their required function and preventing behaviors outside that scope.
  • Security Lessons Learned from Peers on Hybrid Cloud Environments
    Security Lessons Learned from Peers on Hybrid Cloud Environments Doug Cahill Senior Analyst Cybersecurity at ESG | Sigalit Kaidar Director of Product Marketing Aqua Security Recorded: Apr 11 2018 42 mins
    As container adoption is accelerating, the need for container-native security controls that span any environment (multi-cloud, on-premise) is increasing. This webinar, based on results of a survey conducted by ESG, zeros in on the disparity between containerized application deployment plans, to the level of threats facing organizations, and the ensuing lack of sufficient security controls and skills to deal with these challenges.

    Learn from IT colleagues about current top challenges and their plans to incorporate container security controls in hybrid cloud environments. During this webinar, we’ll review:

    •Top attacks organizations are experiencing
    •Operational and readiness gaps mapped to actions
    •A proven container security framework
  • Container Security in the Enterprise
    Container Security in the Enterprise Adrian Lane, Analyst and CTO at Securosis, and Amir Jerbi, co-founder and CTO at Aqua Security Recorded: Mar 27 2018 48 mins
    Following an extensive research update for 2018, join Adrian Lane, CTO at Securosis, and Amir Jerbi, CTO at Aqua Security, for an in-depth look at container security challenges, best practices, and benefits of deploying containers with security in mind.

    While a lot has changed and improved in the container ecosystem, enterprises are still trying to find the most effective ways to ensure security and compliance. Having researched this topic in 2016, and once again in recent months, Adrian will provide insights into key areas:
    How security risks shift in the era of containers, making traditional security tools insufficient key areas to focus on, including the build pipeline, container contents, host security, runtime security, monitoring, and auditing.
  • Securing Kubernetes at Scale
    Securing Kubernetes at Scale Benjy Portnoy, Director of DevSecOps, and Rani Osnat, VP Product Marketing Recorded: Mar 14 2018 45 mins
    Join Aqua security to learn how to secure modern Kubernetes-based applications in an effective and scalable way.
    Kubernetes 1.8 and 1.9 introduced many security constructs that make it possible to secure Kubernetes deployments better than ever. However, recent incidents such as the highly publicized crypto-mining breach at Tesla demonstrate that without adhering to best practices and without proper implementation, Kubernetes-based applications are at risk. In this webinar we will cover this hot topic and demonstrate how to properly secure Kubernetes environments using both K8S-native, open source and commercial tools such as the Aqua Container Security Platform:
    - Embedding and automating security into the CI/CD pipeline
    - Implementing best practices to harden Kubernetes clusters and nodes
    - Using fine-grained access controls to ensure users only have minimal privileges
    - Leveraging Kubernetes constructs (namespaces, deployments) to improve network security
    - Monitoring Kubernetes applications at runtime to detect anomalies
  • Containers: Real-world Solutions for Networking, Security, & Storage
    Containers: Real-world Solutions for Networking, Security, & Storage Gou Rao,Portworx; Rani Osnat, Aqua Security; Bala Ramachandran, Big Switch Networks Recorded: Feb 28 2018 56 mins
    IT organizations are leveraging containers to accelerate cloud-native application delivery, improve development agility, and increase operational efficiency. With this highly-distributed and dynamic application environment, infrastructure components such as networking, storage, and security need to be dynamically managed to operate at the speed of containers. By leveraging software-defined technologies and industry-standard interfaces to support orchestration systems such as Kubernetes, Big Switch’s SDN Fabric, Portworx cloud native storage and Aqua’s security platform overcome these challenges to offer a production-grade solution to deploy and manage containers at scale.

    Watch this recorded webinar to learn why large customers have selected these solutions as the optimal architecture for their container-driven digital transformation. In this webinar, we cover:
    BIG QUESTION #1: How does Big Switch’s Big Cloud Fabric leverage SDN and Container Network Interface (CNI) plugin to simplify network operations and to enhance container visibility?
    BIG QUESTION #2: How can teams get the benefits of Kubernetes storage primitives for dynamic storage provisioning without sacrificing enterprise storage fundamentals such as performance & class of service, HA, backups, snapshots, automated upgrades, and security. BIG QUESTION #3: How can you automate security controls for container deployments, addressing risk and compliance needs, while improving application security well beyond that of traditional applications?

    Joining moderator, Kate Lehman, Head of Communications, Big Switch Networks on the panel are Gou Rao, CTO, Portworx; Rani Osnat, VP Product Marketing, Aqua Security; and Bala Ramachandran, Director of Product Management, Big Switch Networks.
  • Cover Your Base Images: How Early Development Choices Impact Security
    Cover Your Base Images: How Early Development Choices Impact Security Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security Recorded: Dec 6 2017 17 mins
    Security risks, configuration mistakes, and vulnerabilities in Docker images are often traced to some very early decisions. Before containers, developers could count on the security of the infrastructure, including the operating system and prerequisite components. Dev owned the security of the application--Ops owned what it ran on. This is not the case anymore. Today, development owns the choice of the base operating system, the configuration of the final image, and sourcing all the components used for the build. In order to produce secure and compliant applications, development and operations should work together to establish a practice that secures the base images, reviews configuration at time of build and provides a known risk posture for each image and running container.

    This webinar will guide you through building applications on a secure foundation, performing a risk analysis of your final product, and prepare you to handle compliance requirements.
  • Container Security 101
    Container Security 101 Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security Recorded: Nov 7 2017 41 mins
    Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
    Join our webinar to learn:
    •What are containers?
    •How to use containers?
    •What are the security challenges they introduce?

Embed in website or blog