Hi [[ session.user.profile.firstName ]]

Twistlock

  • Date
  • Rating
  • Views
  • Understanding Risks and How to Secure Serverless Applications
    Understanding Risks and How to Secure Serverless Applications
    Keith Mokris, Product Marketing Lead and Kevin Lewis, Solutions Architect Recorded: Mar 13 2019 26 mins
    According to The New Stack, over 75 percent of organizations are already using or planning to use serverless in the next 18 months.* From AWS Lambda to Google Cloud Functions to Microsoft Azure Functions and KNative, enterprises have more cloud provider options than ever before when integrating serverless into their application portfolio.

    In this webinar learn:

    •What security concerns there are for serverless applications
    •Why serverless adoption is growing
    •How to implement best practices for maximizing serverless security
  • The Continuum of Cloud Native Topologies
    The Continuum of Cloud Native Topologies
    James Jones, Principal Solution Architect and Keith Mokris, Product Marketing Lead Recorded: Feb 20 2019 35 mins
    In this webinar, learn a helpful model of viewing the different cloud-native technologies as a continuum, to address different scenarios and efficiently choose which combination of technologies work best for running different workloads.

    The continuum starts with bare metal and VMs on the left, continues into “light” hypervisors (like Canonical’s LXD), and extends into containers and services like AWS Fargate and then, ultimately, serverless. Technologies to the left provide the most isolation and control with the tradeoff of greater management and performance overhead. Those to the right facilitate more agile development and app density with the tradeoff of less control.
  • Proactive Security: Revamp Your Security Strategy with Containers
    Proactive Security: Revamp Your Security Strategy with Containers
    Sonya Koptyev, Director of Evangelism and Keith Mokris, Product Marketing Lead Recorded: Nov 20 2018 27 mins
    If you ask DevOps engineers about the benefits of containers and microservices, their responses will center on the agility, modularity, and scalability that microservices-based architectures provide.
    Security is a crucial and often overlooked advantage of migrating to containers and microservices.

    Containers allow enterprise to secure applications and environments at a more granular and nuanced level. They also empower enterprises to identify and resolve potential security threats before they disrupt workflows, rather than having to adopt a defensive stance oriented around addressing attacks once they are fully underway.

    Watch this webinar to learn:

    •Challenges with traditional security strategies

    •What a proactive approach to security for a microservices-based environment looks like

    •How your organization can adopt a proactive security stance when it makes the migration to containers.
  • Operationalizing Container Security: How to Standardize Container Security
    Operationalizing Container Security: How to Standardize Container Security
    Michael Withrow, Principal Solution Engineer,Twistlock Recorded: Oct 24 2018 50 mins
    Are you are a Security Expert, DevOps resource, or Dev at a large Enterprise? Do you want to migrate your applications to containers and take them to production? Learn how to avoid some of hurdles that you will you have to overcome in your enterprise.

    Modern enterprises have fully embraced the practicality of containers in their application development, but some are still lagging when it comes to operationalizing security in their container environments.

    This webinar will highlight:

    •How to implement controls to reduce risk, from build all the way to runtime
    •How to integrate and automate key steps of the process
    •Anecdotal examples of Twistlock customers challenges/successes from the front lines of container security operationalizing efforts

    Join Twistlock Solution Architect Michael Withrow for a presentation and platform demonstration.
  • Securing AWS Fargate from Build to Runtime
    Securing AWS Fargate from Build to Runtime
    Kevin Lewis, Principal Solution Architect, Twistlock Recorded: Sep 20 2018 24 mins
    Since the announcement of AWS Fargate at AWS re:Invent 2018, enterprises have been working with their development and devops teams to explore how this new technology aligns with their application modernization strategy. With this new CaaS platform comes new operational concerns and security threats.

    Join Principal Solution Architect Kevin Lewis to learn more about:
    • How enterprises are beginning to leverage AWS Fargate
    • Potential risk and security concerns from this emerging paradigm
    • Different security approaches and how Twistlock looks to provide runtime protection for applications using Fargate
  • Incident Response and Forensics in a Cloud Native World
    Incident Response and Forensics in a Cloud Native World
    Neil Carpenter, Principal Solution Architect, Twistlock & Keith Mokris, Product Marketing Lead, Twistlock Recorded: Aug 22 2018 37 mins
    With the rapid increase in containers and cloud native applications at the enterprise, security teams and incident responders are continually tasked with new requirements and challenges for detecting and investigating security incidents.

    In this webinar, Neil Carpenter from Twistlock will discuss what a transition to containers means for incident response teams and how Twistlock can help to ease the pain.

    Register for this webinar to learn:
    • Approaches to gathering incident data from Cloud Native applications
    • Examples of incidents and investigations
    • Details on Twistlock's brand-new Cloud Native Forensics Platform
  • Operationalizing DevSecOps: 7 Best Practices for Cloud Native Applications
    Operationalizing DevSecOps: 7 Best Practices for Cloud Native Applications
    Keith Mokris, Product Marketing Lead, Twistlock Recorded: Jul 18 2018 30 mins
    Modern enterprises are implementing both the tools and the cultural changes required to embrace a DevSecOps mindset and approach.

    This webinar will highlight:

    •Risks you can avoid by embracing DevSecOps
    •DevSecOps as it relates to your container development pipeline
    •How to integrate and automate key steps of the process

    Join Twistlock Product Marketing Manager Keith Mokris for a presentation and platform demonstration.
  • Why Cloud Native Requires a New Approach to Firewalls
    Why Cloud Native Requires a New Approach to Firewalls
    Paul Fox, Principal Solution Architect, Twistlock Recorded: Jun 20 2018 40 mins
    As more organizations deploy containers across the enterprise, network security needs to become more automated and less dependent on static configurations. However, organizations’ network security practices have often not kept pace with the evolution of cloud native technology, and expertise on network security for containers and microservices is lacking.

    Companies often rely primarily on static perimeter based defenses and manually defined VLANs which don’t work well in a cloud native environments because there is no reliable perimeter.

    In this session, Paul Fox, Principal Solution Architect at Twistlock, will:
    • Explain why cloud native environments require a new approach for firewalls
    • Share specific tactics IT and security teams can implement to ensure security across the stack
    • Conduct a live demonstration of Windows to linux container network traffic firewalling
  • How to Modernize Your IT Infrastructure & Secure Your Applications
    How to Modernize Your IT Infrastructure & Secure Your Applications
    Lee Calcote, SolarWinds, Jim Bugwadia, Robert Starmer, Kumulus Technologies, and John Morello, Twistlock Recorded: Jun 14 2018 46 mins
    Join this live panel discussion with experts at DockerCon to learn how containers and microservices can help modernize your IT infrastructure and increase application security.

    Tune into this interactive Q&A session to hear from Docker, Infrastructure, Cloud and DevOps experts while they discuss the following:

    - The pros and cons to modernizing your monolithic applications
    - Trends and technologies in application security
    - The security risks associated with open source and cloud native applications
    - How containers and microservice architectures can increase security and modernize your IT infrastructure

    This live panel will be streamed directly from DockerCon 2018 in San Francisco! Join us live from the comfort of your desk.

    Moderated by: Lee Calcote, Head of Technology Strategy, SolarWinds
    Panelists: Jim Bugwadia, Founder, Nirmata, Robert Starmer, Cloud Advisor & Founding Partner, Kumulus Technologies and John Morello, CTO, Twistlock
  • Beyond Containers: Going Cloud Native with Serverless Architectures
    Beyond Containers: Going Cloud Native with Serverless Architectures
    John Morello, CTO, Twistlock and Lee Calcote, Head of Technology Strategy, SolarWinds Recorded: Jun 14 2018 28 mins
    The journey to cloud native can be a winding road, and with more and more organizations starting on this journey, companies are being taken far beyond just simply containerizing applications.

    Join this live Q&A with John Morello, CTO of Twistlock as he discusses how server-less and container-as-a-service platforms like AWS Fargate are changing how organizations deploy applications - and what this means for security.

Embed in website or blog