Hi [[ session.user.profile.firstName ]]

The Container Security Channel

  • Date
  • Rating
  • Views
  • Using Containers for Hybrid Cloud & Cloud Migration
    Using Containers for Hybrid Cloud & Cloud Migration Amir Jerbi, CTO and co-founder at Aqua Security Recorded: Oct 18 2017 40 mins
    The main benefits of containers vary from speed of development and deployment to scalability, flexibility, and cost-effectiveness – which is what made containers so popular today. But the ability to move containerized applications among different environments, from a public to private cloud for example, is one of the most important benefits of containers, making them enterprise favorites for cloud migration and hybrid cloud architectures.
    In this webinar, we will talk about how to use containers in a hybrid cloud, specifically:
    1.How containers make it easy to migrate and move applications between clouds
    2.What architectural considerations and tooling you need to achieve portability
    3.How to ensure consistency of control, security, and compliance across container cloud deployments
  • Securing Kubernetes Environments
    Securing Kubernetes Environments Liz Rice, Technology Evangelist and Michael Cherny, Head of Security Research Recorded: Aug 9 2017 32 mins
    The Center for Internet Security (CIS) recently published a Benchmark specification for securing Kubernetes host machines.

    In this webinar we will take a closer look at the CIS Kubernetes Benchmark, and discuss how Kubernetes users can apply best practices from the Benchmark in their own deployments. We will cover aspects of secrets management, user authentication and authorization and the use of least privileges. We will end up with a demonstration of our very own kube-bench, an Open Source tool for testing benchmark compliance.

    Join Michael Cherny, Head of Security Research and Liz Rice, Technology Evangelist, to learn about practical actions you can take to make your Kubernetes deployment more secure.
  • Your Secret’s Safe with Me: Using and Managing Secrets in Containers
    Your Secret’s Safe with Me: Using and Managing Secrets in Containers Liz Rice, Technology Evangelist, Aqua Security, and Sagie Dulce, Senior Researcher, Aqua Security Recorded: Jun 28 2017 45 mins
    As organizations adopt containers and prepare to use them in production environments, the issue of managing secrets becomes a major concern:
    How do you assign and deploy secrets to containers while keeping them secure?
    How do you avoid secrets being visible on the network and host, and ensure they do not persist on disk?
    How do update, rotate and revoke secrets without interrupting the containers that use them?
    How do you leverage existing secrets stores (KMSs) and extend their use to containers?

    Join our webinar as we take a closer look into the ‘secrets’ of managing secrets and:
    · Learn some of the “do's and don'ts” of securing secrets
    · Learn the cardinal security requirements of secrets management
    · Watch a live demonstration to learn how secrets can be stolen from a node and how to extract secrets from an encrypted storage.
  • Securing Containers for Production-Ready Environments
    Securing Containers for Production-Ready Environments Amy DeMartine, Principal Analyst, Forrester Research and Rani Osnat, VP Marketing, Aqua Security Recorded: May 24 2017 52 mins
    “Containers Are Not Just Small Virtual Machines; They Need New Security Strategies.” - Forrester report: Ten Basic Steps to Secure Software Containers, April 17, 2017.

    While the rise of the Docker runtime environment and container format has brought standardization to container environment - according to the Forrester report, 31% of enterprise cloud developers are using containers during design and testing - risks to containers are on the rise as well. In this webinar, we will go over ten security steps to secure containers.

    Join our webinar to learn how to:
    • Secure containers now, before they put your customers at risk
    • Understand the distinct security implications of the layered container stack
    • Master the 10 tasks to protect your container environment

    Aqua Security webinar featuring Forrester Research.
  • Containers from Scratch
    Containers from Scratch Liz Rice, Technology Evangelist Recorded: May 4 2017 46 mins
    We’ve all heard of containers, and as Docker’s tagline suggests, they let you “Build, Ship, Run, Distributed Applications, Anywhere”. In some ways they are a bit like a lightweight Virtual Machine, but what does that really mean? In this presentation we will go through some container basics, and then show what a container really is (and how container engines like Docker work) by writing a container in a few lines of code.

    Join our webinar in order to learn:
    •Containers basics
    •How a container engine uses namespaces and control groups to create containers
    •What makes containers so appealing to developers
  • Shift-Left Security: How to Automate Security into Your Pipeline
    Shift-Left Security: How to Automate Security into Your Pipeline Benjy Portnoy, Aqua Security Recorded: Feb 16 2017 37 mins
    As DevOps role in the IT management is growing and virtual containers are rapidly gaining popularity – Docker is the fastest growing DevOps tool – DevOps now need to deal with security issues as well, and rethink their overall security strategy. How can they maintain an enterprise-grade security? Join our webinar to learn:
    •How to manage vulnerabilities in container images at DevOps speed?
    •How to fully automate security tests and bake them into your pipeline?
    •How to satisfy IT security and compliance requirements with minimal effort?
  • Assembling a Container Security Program
    Assembling a Container Security Program Securosis and Aqua Security Recorded: Jan 24 2017 61 mins
    Webinar with Securosis: Containers are scaring security pros because of their lack of transparency. The burden of securing containers falls across Development, Operations, and Security teams — but these groups are not always certain how to tackle the issues.
    Join our webinar to:

    -Understand what are the primary threats to container environments
    -Learn how to set up a security program for virtual containers, from development to runtime
    -Hear why dynamic behavior detection should be part of your ongoing security monitoring
  • Is Your Software Safer in Containers?
    Is Your Software Safer in Containers? Aqua Security and WhiteSource Recorded: Oct 26 2016 39 mins
    Are you using containers (e.g. Docker) in your organization? Is your software safer on containers? In this session we will talk about security steps you need to take to make sure your security is aligned with your design process.
  • Achieve Software Delivery Speed and Security With Microservices and Containers
    Achieve Software Delivery Speed and Security With Microservices and Containers Forrester Research and Aqua Security Recorded: Sep 22 2016 62 mins
    DevOps aim to increase one’s speed of software delivery, but not with the same old architecture. One also needs microservices and containers (e.g., Docker) to package software for incremental change. But containers are new, and they introduce a range of new security issues that developers and security architects have not had to deal with before.
    Guest presenter, Randy Heffner of Forrester Research, answers questions about microservices and container best practices

Embed in website or blog