Hi [[ session.user.profile.firstName ]]

Sysdig

  • Date
  • Rating
  • Views
  • How to manage vulnerabilities in container environments
    How to manage vulnerabilities in container environments Knox Anderson Recorded: Sep 13 2018 23 mins
    Containers have sped up the CI/CD process. It’s now easy to package up an application and deploy it in a matter minutes. This allows teams to move faster, and makes it easier to patch software that may contain vulnerabilities. However, this increase in speed has create a need for new processes and tooling.

    In this webinar we’ll cover:

    -How to scan images for vulnerabilities as part of the CI/CD process
    -Why it’s important to scan images in registries as well as part of the CI/CD pipeline
    -How to prevent vulnerable images from being deployed
    -How to alert if new vulnerabilities are found in images running in production
  • Multi-cloud monitoring with Sysdig
    Multi-cloud monitoring with Sysdig Eric Carter Recorded: Sep 13 2018 32 mins
    Enterprises are taking advantage of AWS, Google, and Azure along with private data centers as they move toward a multi-cloud strategy. Thanks to container and orchestration technology, deploying and moving applications and services across clouds is easier than ever. But how do you monitor performance, health, and security across diverse, distributed infrastructure? And how do you see what’s happening inside your containers across clusters and regions to ensure you’re meeting your business goals?

    Watch this webinar to learn how Sysdig enables cross-cloud and multi-cloud monitoring, alerting, and troubleshooting with Docker and Kubernetes with full visibility into your microservices. In this session we will discuss and demo:

    -How to monitor containers running on multiple clusters in a multi-cloud environment
    -How to tap into EKS, GKE, and AKS to understand the health of your Kubernetes-based services
    -How to troubleshoot performance problems and failures across complex cloud deployments
  • Best Practices for Implementing Container Security
    Best Practices for Implementing Container Security Knox Anderson, Sysdig Recorded: Aug 9 2018 57 mins
    Containers have changed the way we build, deploy, run, and investigate what goes on with our applications. It’s critical to validate that you’ve configured your containers securely, they don’t include any vulnerabilities, and enforce they are doing what’s expected in production.

    In this webinar we’ll cover:

    -How to implement image scanning in your CI/CD pipeline
    -How to prevent vulnerable images from being deployed to production
    -Methods for detecting anomalous behavior inside containers
    -What’s required for forensics when the container may no longer be running
    -How to audit and report on compliance at each stage of your SDLC
  • Kubernetes Monitoring: Best Practices
    Kubernetes Monitoring: Best Practices Eric Carter Recorded: Aug 8 2018 58 mins
    Kubernetes-orchestrated applications running on containers require a new approach to performance monitoring and troubleshooting. Join Sysdig for an overview of what you can expect when monitoring Kubernetes-based microservices and what to consider for optimal effectiveness. During this webinar you'll learn:

    - What are the key metrics and components to monitor in a Kubernetes environment?
    - How do containers complicate monitoring and what you can do to see inside?
    - When should you set alerts, and for what, to keep on top of cluster behavior?
    - What role do custom metrics (e.g., Prometheus) play for observing app behavior?
    - How do you troubleshoot in an auto-scaling, distributed environment?

    This webinar will include a demonstration of open source and commercial tools that can help you solve these new challenges. Attend to get insight that will help you operate Kubernetes deployments in development and production at any scale.
  • Building an Open Source Container Security Stack
    Building an Open Source Container Security Stack Daniel Nurmi from Anchore with Jorge Salamero Sanz & Michael Ducy from Sysdig Recorded: Aug 2 2018 57 mins
    Container security is top-of-mind for any organization adopting Docker and Kubernetes. In this session Sysdig and Anchore present how you can build a complete open source container security stack for Docker and Kubernetes with Falco and Anchore Engine.

    This session will live demo:

    -Using Falco, NATS and Kubeless to build a Kubernetes response engine and implement real-time attack remediation with security playbooks using FaaS.
    -How Anchore Engine can detect software vulnerabilities in your images, and how it can be integrated with Jenkins, Kubernetes and Falco.
  • Best practices for Forensics and Incident Response in Containers
    Best practices for Forensics and Incident Response in Containers Knox Anderson Recorded: Aug 1 2018 23 mins
    Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. Theyre developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.

    While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

    In this webinar we'll cover:

    - How containers change incident response and forensics

    - Best practices around forensic data collection in container environments

    - Compare opensource and commercial forensics options

    - A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool
  • Comparing Prometheus custom metrics to APM
    Comparing Prometheus custom metrics to APM Eric Carter Recorded: Jul 31 2018 33 mins
    Use PROMETHEUS? Take our survey: https://www.surveymonkey.com/r/8SYCDQB

    Developers have numerous options for instrumenting code to monitor and troubleshoot application performance. When should you turn to custom metrics like Prometheus, statsd and JMX? When are tracing and APM the right fit? How do these solutions compare?

    Join us for our online session to learn:
    - The advantages and disadvantages of different approaches for application performance monitoring
    - When you should choose one solution over another and what the best use cases are for each
    - How to consolidate monitoring and accelerate troubleshooting when using multiple options
  • Open source Kubernetes run-time security with Falco
    Open source Kubernetes run-time security with Falco Michael Ducy Recorded: Jul 24 2018 20 mins
    Effective security requires a layered approach. If one layer is comprised, the additional layers will (hopefully) stop an attacker from going further. Much of container security has focused on the image build process and providing providence for the artifacts in a container image, and restricting kernel level tunables in the container runtime (seccomp, SELinux, capabilities, etc). What if we can detect abnormal behavior in the application and the container runtime environment as well? In this talk, we’ll present Falco - an open source project for runtime security - and discuss how it provides application and container runtime security. We will show how Falco taps Linux system calls to provide low level insight into application behavior, and how to write Falco rules to detect abnormal behavior. Finally we will show how Falco can trigger notifications to stop abnormal behavior, notify humans, and isolate the compromised application for forensics. Attendees will leave with a better understanding of the container security landscape, what problems runtime security solves, & how Falco can provide runtime security and incident response.
  • Sysdig & SANS Institute: Forensics and Incident Response in Containers
    Sysdig & SANS Institute: Forensics and Incident Response in Containers Knox Anderson, Sysdig and Jake Williams, SANS Analyst Recorded: Jul 20 2018 61 mins
    Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. They’re developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.

    While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

    In this webinar we'll cover:
    - How containers change incident response and forensics
    - Best practices around forensic data collection in container environments
    - Compare opensource and commercial forensics options
    - A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool
  • Kubernetes Security Features
    Kubernetes Security Features Jorge Salamero Sanz Recorded: Jul 3 2018 22 mins
    Kubernetes security features focus on infrastructure layer: verifying that configuration is safe, follow the security best practices, the last privileges and your deployment has no known issues. How that compares with runtime security?
    - Kubernetes RBAC overview
    - Kubernetes Pod Security Policy
    - Kubernetes Network Policy
    - Securing Kubernetes components and applications

Embed in website or blog