Hi [[ session.user.profile.firstName ]]

The Container Security Channel

  • Date
  • Rating
  • Views
  • Cloud-Native Security at Scale: Multi-App, Multi-Cloud, Multi-Stack, Multi-Team
    Cloud-Native Security at Scale: Multi-App, Multi-Cloud, Multi-Stack, Multi-Team
    Rani Osnat - V.P. Product Marketing, Aqua Security Recorded: Nov 28 2018 44 mins
    Containers and serverless adoption continues to expand, with the numbers of applications growing within enterprises. Many organizations now run multiple applications, across disparate teams, running on-prem or on different clouds, and requiring varying levels of security and compliance.

    Attend this webinar to learn how to better manage complex, multi-application, multi-cloud and multi-team enterprise environments with easy to manage policies, intuitive runtime visibility and role-based access control (RBAC) at scale.
  • Shift Left and Then Shift Up: Strengthening Your Security Posture
    Shift Left and Then Shift Up: Strengthening Your Security Posture
    Tsvi Korren - Chief Solutions Architect at Aqua Security Recorded: Nov 26 2018 54 mins
    The concept of “shift left” engages security earlier in the development cycle of cloud-native applications, accelerating development while reducing risk. However, migrating to cloud-native environments also necessitates the security team to “shift up”, focusing on the application layer to account for the shared-service model and “thin OS” environments that are prevalent in these environments.

    Attend this webinar to learn why Shifting Up provides improved security and cost efficiency in cloud-native environments, including:

    •Container environments
    •Containers as a Service (CaaS)
    •Serverless implementations
  • Secure DevOps: Fact or Fiction?
    Secure DevOps: Fact or Fiction?
    SANS Jim Bird and Barb Filkins and Rani Osnat, Aqua Security Recorded: Nov 14 2018 62 mins
    A new survey of SANS practitioners has examined how security and risk management leaders will manage the collaborative, agile nature of DevOps to be seamless and transparent in the development process.

    In this webcast, Part 1 on the topic, SANS Analyst Authors Jim Bird and Barb Filkins will reveal how practitioners are handling evolving DevOps requirements and challenges, and how they're integrating security into the process.
  • Fast & Secure: Protect Kubernetes Apps on Google Cloud with Aqua Security
    Fast & Secure: Protect Kubernetes Apps on Google Cloud with Aqua Security
    Maya Kaczorowski (Google), Rani Osnat and John Michaelson (Aqua) Recorded: Nov 9 2018 43 mins
    Google said it themselves, “We are on a mission to make containers accessible to everyone, especially the enterprise.” But enterprises also need enterprise-grade security.

    Enter the Aqua Container Security Platform (CSP), the first consumption-based container runtime security solution available on the Google Cloud Platform (GCP) Marketplace.

    Aqua CSP is deployed onto your GKE cluster with one click. Once deployed, you get full lifecycle security for your container and Kubernetes-based applications, from image scanning to runtime and network controls.

    Attend this webinar and learn how to:
    • Protect GKE workloads while paying only for running nodes, per hour, via your monthly GCP bill.
    • Scan images in your pipeline and in the Google Container Registry, and ensure that only trusted images are deployed into production
    • Apply least-privilege security policies to your runtime environment to automatically detect and prevent malicious activity and container-related attacks
    • Segment services on your cluster with container-level firewalling
    • Integrate with Google’s Cloud Security Command Center for streamlined visibility
  • Securing Apps Across Containers & VMs - Ensuring Good Rather than Chasing Bad
    Securing Apps Across Containers & VMs - Ensuring Good Rather than Chasing Bad
    Nolan Karpinski with VMware and John Michaelson with Aqua Security Recorded: Oct 25 2018 46 mins
    As more businesses embrace modern, agile application development processes, implementing security at the speed of the business requires an approach that easily extends across both containers and VMs.

    Attend this webinar and learn how this integrated, highly scalable approach to securing VMs and containers through a combined solution allows security teams to visualize their security policy for VMs and containers within AppDefense, as well as view and respond to policy violations from Aqua within AppDefense.

    During this webinar, we’ll review:

    • Runtime assurance for containers that sends container context — called “runtime profiles” — to AppDefense
    • How this policy is visualized within AppDefense once it’s inherited from Aqua in order to rationalize policy across various services and modes of deployment.
    • Event identification and tracing in AppDefense
  • Preventive Security for Kubernetes
    Preventive Security for Kubernetes
    Liz Rice Technology Evangelist, Aqua Security Recorded: Oct 16 2018 47 mins
    Aqua’s open source tools arm Kubernetes administrators and developers with an easy way to identify weaknesses in their deployments so that they can address those issues before they are exploited by attackers.

    During this webinar we’ll review how Aqua's open source tools offer preventive security for Kubernetes:

    •Kube-Bench: checks a Kubernetes cluster against 100+ checks documented in the CIS Kubernetes Benchmark.
    •Kube-Hunter: conducts penetration tests against Kubernetes clusters that hunt for exploitable vulnerabilities and misconfiguration - both from outside the cluster as well as inside it (running as a pod).
  • From Containers to Serverless:  Keys to Securing Cloud-Native Workloads
    From Containers to Serverless: Keys to Securing Cloud-Native Workloads
    Ariel Shuper, Sr. Director of Product Management Recorded: Oct 10 2018 33 mins
    As your environment expands from managing your own containers to include Containers as a Service (CaaS) and Serverless, what are the new risks of abstracting the underlying infrastructure? What are the best practices for ensuring consistent policies and compliance across hybrid environments combining serverless and containers?

    During this webinar, we will explore the impact of CaaS and Serverless deployments on the enterprise security landscape and how to best protect applications regardless of where they run:

    •The attack vectors of serverless environments
    •The common practices which can be used across the different platforms
    •The unique steps to protect each workload type and environment
    •Why legacy security tools are not sufficient for microservices landscape

    You’ll walk away with a solid understanding of how to combat the inherent security challenges of Serverless architectures and micro-services landscape.
  • Google Cloud Platform - How to deploy Aqua onto your GKE cluster
    Google Cloud Platform - How to deploy Aqua onto your GKE cluster
    John Michaelson, Director of Partner Integrations Recorded: Oct 4 2018 13 mins
    This 12 minute video explains how to:
    •Protect GKE workloads while paying only for running nodes, per hour, via your monthly GCP bill.
    •Scan images in your pipeline and in the Google Container Registry, and ensure that only trusted images are deployed into production
    •Apply least-privilege security policies to your runtime environment to automatically detect and prevent malicious activity and container-related attacks
    •Segment services on your cluster with container-level firewalling
    •Integrate with Google’s Cloud Security Command Center for streamlined visibility
  • Cloud-Native Application Security Best Practices Expert Advice for Developers
    Cloud-Native Application Security Best Practices Expert Advice for Developers
    Karthik Gaekwad, Full Stack Developer | Bob Quillin,VP Oracle Cloud Developer Relations Recorded: Sep 28 2018 62 mins
    ADTMag hosted two very credible presenters, both cloud-native developers from Oracle, during htis Aqua sponsored DevSecOps presentation.

    Karthik Gaekwad, full stack developer and principle cloud-native evangelist and Bob Quillin, Vice President, Oracle Cloud Developer Relations, covered practical use cases and scenarios from a developers perspective about best practices to secure cloud-native apps. They also highlighted open source tools, including Aqua’s kube-bench.
  • Active Workload Protection on Amazon EKS and AWS Fargate
    Active Workload Protection on Amazon EKS and AWS Fargate
    Scott Ward, Principal Solution Architect, AWS and Liz Rice Technology Evangelist, Aqua Security Recorded: Sep 14 2018 38 mins
    Container adoption has been skyrocketing, but as enterprises mature their container implementations, they face challenges in large-scale orchestration, time-to-market, and security. Amazon’s Managed Kubernetes Service (EKS) and AWS Fargate, which runs containers without having to manage servers or clusters, offer organizations great flexibility, scale and hassle-free options for deploying container-based applications.

    The different modes of deployment also make it necessary to gain visibility and uniform security controls across EKS clusters and Fargate deployments. Protecting the application layer requires in-depth understanding of the workloads and their intended functionality.

    Attend this webinar to see how the combination of AWS security controls and Aqua’s comprehensive container security platform provide a complete solution for securing containerized applications:

    •Full life-cycle security controls that ensure applications are secured before they’re deployed
    •Visibility into the security and compliance posture of applications deployed across Fargate and EKS
    •Single-pane-of-glass management of security policy, uniformly across clusters and deployment modalities
    •Leveraging other native AWS services including Amazon ECR, AWS KMS, IAM roles, and PrivateLink

    Join our speakers Scott Ward, Principal Solution Architect, AWS and Liz Rice, Technology Evangelist, Aqua to learn how to secure your AWS container deployments.

Embed in website or blog