Hi [[ session.user.profile.firstName ]]

Twistlock

  • Date
  • Rating
  • Views
  • Full Lifecycle Security with OpenShift + Twistlock
    Full Lifecycle Security with OpenShift + Twistlock
    Jason Dobies, RedHat Principal Technical Marketing Manager and James Jones, Twistlock Principal Solution Architect Recorded: May 15 2019 51 mins
    Enterprises across government, healthcare, financial services, and the intelligence community that use Red Hat OpenShift to build, deploy, and manage their containers also use Twistlock to provide complete security protection for their environments. Twistlock open source contributions are already part of OpenShift, and since Twistlock runs as a native OpenShift app, it’s easy to deploy. As a Red Hat OpenShift Primed partner and Kubernetes Technology Partner, you can trust Twistlock to provide reliable, well-integrated defense for OpenShift.

    Join Twistlock Director of Product Marketing and Evangelism Sonya Koptyev for this live webinar featuring RedHat Principal Technical Marketing Manager Jason Dobies and Twistlock Principal Solution Architect James Jones to learn more about:

    •Vulnerability Prevention from Development to Runtime
    •OpenShift Security During Runtime
    •Enterprise Compliance
    •Risk Prioritization Tailored to Your Environment
    •Advanced Threat Intelligence
  • Cloud Native: Infrastructure Trends, Security Challenges, and Best Practices
    Cloud Native: Infrastructure Trends, Security Challenges, and Best Practices
    451 Research Senior Analyst Fernando Montenegro and Twistlock CTO John Morello Recorded: Apr 4 2019 59 mins
    Today, infrastructure teams have more options than ever before for running cloud workloads to enable developers to build and deploy modern applications faster than ever before. The rise in container adoption, and adjacent cloud native technologies like Kubernetes, serverless, and on-demand container platforms such as AWS Fargate and Microsoft ACI, presents new security challenges.

    Cloud native computing truly encompasses a continuum, spanning VMs, containers, serverless, and other emerging technologies. In this webinar, we hope to shine a light on ways security can protect the full cloud native continuum -- with speed to enable devops while providing security depth and control required by today’s enterprises.

    Join featured speaker 451 Research Senior Analyst Fernando Montenegro and Twistlock CTO John Morello in this webinar to learn:

    •Trends in modern infrastructure adoption and how this impacts the enterprise
    •Challenges for IT teams and security leaders when protecting cloud native applications and workloads at scale
    •Use cases and advice for implementing security best practices

    Register for this webinar to learn more.
  • Securing the Istio Service Mesh: Twistlock Compliance Checks
    Securing the Istio Service Mesh: Twistlock Compliance Checks
    Neil Carpenter, Principal Solution Architect and Sonya Koptyev, Director of Product Marketing and Evangelism Recorded: Mar 27 2019 41 mins
    Service meshes are one of the newest innovations in the world of microservices and cloud-native computing. They’re a critical tool for making microservices applications feasible to implement and manage.

    At the same time, however, service meshes — like all components of the software stack — must be properly secured. Without sufficient security oversight, service meshes run the risk of becoming a vector for attack into software infrastructure, as well as a compliance liability.

    Register now to learn more about:

    •How service meshes work and which security considerations apply to them
    •Why Twistlock identified Istio compliance checks as an important gap to address for the cloud native community
    •The official Twistlock compliance checks for Istio, including proper configurations, risk severity, major threats, and countermeasures
  • Understanding Risks and How to Secure Serverless Applications
    Understanding Risks and How to Secure Serverless Applications
    Keith Mokris, Product Marketing Lead and Kevin Lewis, Solutions Architect Recorded: Mar 13 2019 26 mins
    According to The New Stack, over 75 percent of organizations are already using or planning to use serverless in the next 18 months.* From AWS Lambda to Google Cloud Functions to Microsoft Azure Functions and KNative, enterprises have more cloud provider options than ever before when integrating serverless into their application portfolio.

    In this webinar learn:

    •What security concerns there are for serverless applications
    •Why serverless adoption is growing
    •How to implement best practices for maximizing serverless security
  • The Continuum of Cloud Native Topologies
    The Continuum of Cloud Native Topologies
    James Jones, Principal Solution Architect and Keith Mokris, Product Marketing Lead Recorded: Feb 20 2019 35 mins
    In this webinar, learn a helpful model of viewing the different cloud-native technologies as a continuum, to address different scenarios and efficiently choose which combination of technologies work best for running different workloads.

    The continuum starts with bare metal and VMs on the left, continues into “light” hypervisors (like Canonical’s LXD), and extends into containers and services like AWS Fargate and then, ultimately, serverless. Technologies to the left provide the most isolation and control with the tradeoff of greater management and performance overhead. Those to the right facilitate more agile development and app density with the tradeoff of less control.
  • Proactive Security: Revamp Your Security Strategy with Containers
    Proactive Security: Revamp Your Security Strategy with Containers
    Sonya Koptyev, Director of Evangelism and Keith Mokris, Product Marketing Lead Recorded: Nov 20 2018 27 mins
    If you ask DevOps engineers about the benefits of containers and microservices, their responses will center on the agility, modularity, and scalability that microservices-based architectures provide.
    Security is a crucial and often overlooked advantage of migrating to containers and microservices.

    Containers allow enterprise to secure applications and environments at a more granular and nuanced level. They also empower enterprises to identify and resolve potential security threats before they disrupt workflows, rather than having to adopt a defensive stance oriented around addressing attacks once they are fully underway.

    Watch this webinar to learn:

    •Challenges with traditional security strategies

    •What a proactive approach to security for a microservices-based environment looks like

    •How your organization can adopt a proactive security stance when it makes the migration to containers.
  • Operationalizing Container Security: How to Standardize Container Security
    Operationalizing Container Security: How to Standardize Container Security
    Michael Withrow, Principal Solution Engineer,Twistlock Recorded: Oct 24 2018 50 mins
    Are you are a Security Expert, DevOps resource, or Dev at a large Enterprise? Do you want to migrate your applications to containers and take them to production? Learn how to avoid some of hurdles that you will you have to overcome in your enterprise.

    Modern enterprises have fully embraced the practicality of containers in their application development, but some are still lagging when it comes to operationalizing security in their container environments.

    This webinar will highlight:

    •How to implement controls to reduce risk, from build all the way to runtime
    •How to integrate and automate key steps of the process
    •Anecdotal examples of Twistlock customers challenges/successes from the front lines of container security operationalizing efforts

    Join Twistlock Solution Architect Michael Withrow for a presentation and platform demonstration.
  • Securing AWS Fargate from Build to Runtime
    Securing AWS Fargate from Build to Runtime
    Kevin Lewis, Principal Solution Architect, Twistlock Recorded: Sep 20 2018 24 mins
    Since the announcement of AWS Fargate at AWS re:Invent 2018, enterprises have been working with their development and devops teams to explore how this new technology aligns with their application modernization strategy. With this new CaaS platform comes new operational concerns and security threats.

    Join Principal Solution Architect Kevin Lewis to learn more about:
    • How enterprises are beginning to leverage AWS Fargate
    • Potential risk and security concerns from this emerging paradigm
    • Different security approaches and how Twistlock looks to provide runtime protection for applications using Fargate
  • Incident Response and Forensics in a Cloud Native World
    Incident Response and Forensics in a Cloud Native World
    Neil Carpenter, Principal Solution Architect, Twistlock & Keith Mokris, Product Marketing Lead, Twistlock Recorded: Aug 22 2018 37 mins
    With the rapid increase in containers and cloud native applications at the enterprise, security teams and incident responders are continually tasked with new requirements and challenges for detecting and investigating security incidents.

    In this webinar, Neil Carpenter from Twistlock will discuss what a transition to containers means for incident response teams and how Twistlock can help to ease the pain.

    Register for this webinar to learn:
    • Approaches to gathering incident data from Cloud Native applications
    • Examples of incidents and investigations
    • Details on Twistlock's brand-new Cloud Native Forensics Platform
  • Operationalizing DevSecOps: 7 Best Practices for Cloud Native Applications
    Operationalizing DevSecOps: 7 Best Practices for Cloud Native Applications
    Keith Mokris, Product Marketing Lead, Twistlock Recorded: Jul 18 2018 30 mins
    Modern enterprises are implementing both the tools and the cultural changes required to embrace a DevSecOps mindset and approach.

    This webinar will highlight:

    •Risks you can avoid by embracing DevSecOps
    •DevSecOps as it relates to your container development pipeline
    •How to integrate and automate key steps of the process

    Join Twistlock Product Marketing Manager Keith Mokris for a presentation and platform demonstration.

Embed in website or blog