Hi [[ session.user.profile.firstName ]]

Using Containers for Hybrid Cloud & Cloud Migration

The main benefits of containers vary from speed of development and deployment to scalability, flexibility, and cost-effectiveness – which is what made containers so popular today. But the ability to move containerized applications among different environments, from a public to private cloud for example, is one of the most important benefits of containers, making them enterprise favorites for cloud migration and hybrid cloud architectures.
In this webinar, we will talk about how to use containers in a hybrid cloud, specifically:
1.How containers make it easy to migrate and move applications between clouds
2.What architectural considerations and tooling you need to achieve portability
3.How to ensure consistency of control, security, and compliance across container cloud deployments
Recorded Oct 18 2017 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Amir Jerbi, CTO and co-founder at Aqua Security
Presentation preview: Using Containers for Hybrid Cloud & Cloud Migration

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Aqua Serverless Security for AWS Lambda May 1 2019 5:00 pm UTC 60 mins
    Ariel Shuper, Aqua Security and Mike Deck, AWS
    Presented in partnership with AWS

    Serverless functions are a paradigm shift in the way that modern-day applications are designed and developed. The agility, the associated cost-saving, and the lack of need for an Ops team has led to swift adoption of serverless technology such as AWS Lambda.

    Serverless also changes the way you protect your application, creating the need for a new solution that can address its unique framework. Aqua Security identified the security challenges of serverless architectures some time ago, and can help keep your applications compliant and secure with two unique offerings:

    -Aqua’s Serverless Security provides visibility into potential security pitfalls, risk-mitigation recommendations, and policy-enforcement options. It gives users a real-time view of function behavior and flags anomalies based on a behavioral model.

    -Aqua’s Advanced Runtime Protection leverages Lambda’s layer to provide comprehensive runtime protection to protect against remote code executions that leverage vulnerabilities in the function’s code, or usage of debug/cli tools like Bash and Shell with negligible impact on your function’s performance.

    This webinar, presented in partnership with AWS, will explain how you can secure your serverless workloads on AWS Lambda.
  • Why Container Security Has Become a Top Challenge for Enterprises Apr 24 2019 5:00 pm UTC 60 mins
    Rani Osnat, Aqua Security and Mark Bouchard, CyberEdge
    A joint presentation by Aqua Security and CyberEdge

    Based on findings published in CyberEdge’s 6th annual 2019 Cyberthreat Defense Report*, containers are highlighted as one of this year’s “weakest links” in IT security given the lowest overall security posture score.

    Mostly this can be attributed to the challenges enterprises face as they transition their containerized applications from the Dev/Test environment into production. Containers require a new approach to security as the traditional security infrastructure is not applicable to cloud native and serverless deployments. Rather they must leverage the cloud-native principles of immutability, microservices and portability using machine-learned behavioral whitelisting, integrity controls and nano-segmentation.

    We will discuss :
    •Key findings from the 2019 Cyberthreat Defense Report
    •The unique security challenges (and benefits) of containers
    •What leading enterprises are doing to automate their container security
    •What you should look for in a container security solution
  • Securing Cloud Native Applications Across the Technology Spectrum Recorded: Apr 16 2019 49 mins
    Rani Osnat, VP of Product Marketing, Aqua Security
    With the accelerated pace at which enterprise development and deployment of cloud native microservices-based applications is growing, supporting cloud native applications requires a holistic approach to security and compliance, across the application lifecycle as well as up and down the stack.

    This webinar helps security teams understand methods for managing and enforcing security policies, spanning both multi-cloud and on-premises environments across a blend of:

    •VM-based containers
    •Containers-as-a-Service (CaaS)
    •Function-as-a-Service (FaaS)
    •Orchestration layer

    You’ll learn how the latest release of the Aqua Cloud Native Security platform protects applications across the technology spectrum as well as against undiscovered vulnerabilities by implementing tight compliance and whitelisting-based zero-trust security.
  • The Emergence of Kubernetes and the Need for Enterprise-Grade Security Recorded: Apr 9 2019 53 mins
    Amir Jerbi, CTO at Aqua Security
    As the adoption of containers and serverless continues to expand to a greater number of enterprises, and to greater numbers of applications within enterprises, it’s not just about managing nodes anymore. Many organizations now run multiple applications, across disparate teams, running on-prem or on different clouds and orchestrators, resulting in a growing need for scalable security that’s easy-to-manage.

    With this complex, scaling environment, who owns Kubernetes security?

    Attend this webinar to learn how to better manage complex, multi-application, multi-cloud and multi-team enterprise Kubernetes environments with easy to manage policies, intuitive runtime visibility and RBAC at scale.
  • The State of Kubernetes Security Recorded: Mar 12 2019 26 mins
    Liz Rice, Aqua Security & Michael Hausenblas, Red Hat
    Presented by the authors of the bestselling O’Reilly Book “Kubernetes Security: Operating Kubernetes Clusters and Applications Safely”

    Kubernetes is fundamentally a complex system with lots of different potential attack vectors aimed at data theft, currency mining and other threats. This talk provides an overview of the current state of security-related features in Kubernetes, and gives directional starting points on how to secure Kubernetes components and the applications that run on top of these Kubernetes components. For the topics explored, pointers on where to further investigate will be offered.

    Topics Covered:
    •Container image scanning and container security
    •Security boundaries (pod, namespace, node, cluster)
    •Securing the control plane and Kubernetes APIs
    •Authentication and authorization, including new tools available
    •Say no to root (and why)!
    •Runtime considerations, secrets management and more!
  • 57 Easy Steps to Secure Serverless Functions Recorded: Mar 11 2019 54 mins
    Ariel Shuper
    All kidding aside, while recent research indicates significant risks in serverless apps, these risks can largely be mitigated using simple, automated steps in CI/CD pipelines, in both staging and production environments. Taking the right preventative measures can significantly reduce risk and thwart potential attacks.

    In this webinar, we analyze the risks and attack vectors highlighted by OWASP and other research, categorizing them into 4 categories based on their severity/potential impact. We will show how Aqua’s serverless security solution addresses each category, demonstrating the following:

    •Securing the serverless CI/CD pipeline
    •Automated checks in staging environments that create least privilege roles/permissions model
    •Profiling Functions’ behavior based data collected during runtime.
    •Usage of AWS Lambda layers to identify/block malicious activity in serverless functions
  • Shifting Left: Security Through Automation Recorded: Feb 28 2019 33 mins
    Aqua Security and CircleCi
    Presented in partnership with CircleCi

    Enterprises are doing what they can to foster a “security first” mentality within their IT organizations, but don’t always have the necessary skills in-house and may not take the steps needed to build security into an application by design.

    As DevOps accelerate application development and deployment, implementing security as an afterthought is no longer an option, since that approach cannot handle the velocity and scale of agile application deployments. Automation is key to embedding security into the DevOps pipeline and ensuring that code is secure before it’s deployed, not after.

    In this webinar, Aqua Security and CircleCI will show you how you can bake security into the development process, seamlessly, to ensure that your applications are fully secured throughout the development lifecycle. We’ll show you how you can:

    •Build software quickly, using custom job orchestration
    •See all of your builds at a glance, including failed builds and slow tests
    •Identify image vulnerabilities as you build your application
    •Configure your “risk-appetite" to pass or fail images in build based on vulnerability severity
  • Container and Cloud Native Security: Sharing 3 Years of Valuable Experience Recorded: Feb 20 2019 62 mins
    Dustin Aubrey with Aqua Security
    Container and Cloud-Native Application Security. It’s our passion. We’ve been there alongside our customers every step of the way: enabling them to secure applications before they're deployed, handling challenges in automating DevSecOps, helping them to scale without increasing risk, and more. We’ve learned a lot.

    During this webinar, learn from our three years of hands-on experiences in this rapidly evolving market working on some of the world’s most advanced and large-scale container deployments.

    We’ll share our views on:
    •What to invest your time in - what’s most impactful for the effort
    •What has been successful
    •What to do as you scale up
  • Best of Both Worlds: Keep your Apps Performant & Secure using Datadog and Aqua Recorded: Jan 31 2019 41 mins
    Rani Osnat, Aqua Security and Jason Yee, Datadog
    If your infrastructure is running a high load, how can you know whether that's a normal operation or a hacker who's just using your servers to mine bitcoins? In this webinar, we'll show you a better approach to securing containers and how the right combination of monitoring and security tools keeps your systems performant, reliable and secure – against crypto currency mining, and a lot more.

    In this webinar, we'll cover how you can:
    -Aggregate data streams and customize how your data is displayed
    -Track known vulnerabilities and security issues in existing images
    -Monitor containers running from unauthorized images
    -Monitor runtime policy violations and audit events
  • Why You Need a Cloud Native Security Solution and How to Evaluate One Recorded: Jan 23 2019 50 mins
    Benjy Portnoy, CISSP, CISA, Aqua Security
    Benjy Portnoy, Director of DevSecOps at Aqua Security, has spent the past 3 years working with dozens of organizations on securing their deployments of Kubernetes, Docker, Red Hat OpenShift and other cloud native technologies.

    In this webinar, Benjy will share his experiences to help you figure out:

    • What to expect from platform providers, security-wise, and what gaps remain
    • The maturity curve of securing cloud native applications (containers, serverless and what’s in between) – from the most basic controls to advanced runtime controls
    • What to expect from a cloud native security platform: Key criteria to consider
    • How to ensure that your organization is ready to go into production across various stake holders and teams
  • Security Considerations for CF Container Runtime vs. CF Application Runtime Recorded: Jan 15 2019 34 mins
    Rani Osnat, VP of Product Marketing, Aqua Security
    The growing adoption of containers and the availability of scalable orchestration tools (e.g. Kubernetes) are creating opportunities to develop more agile, easy-to-update applications that combine stateful and stateless modes. The emerging architecture combines both modalities, that have very different security considerations and risk profiles.

    While Cloud Foundry Application Runtime is well-suited to 12-factor application development, Cloud Foundry Container Runtime is better for flexible, rapidly-updated apps that can scale-out specific parts of the application in a very elastic way. However, from a security standpoint, CFCR presents challenges in the form of 3rd party open-source inflow, developer-driven code changes, and frequent updates. It also presents benefits in the form of immutability, better network segmentation, and lack of persistence on the host (the notion we sometimes refer to as “reverse uptime”).

    This webinar describes how to approach these divergent needs and demonstrates some of the methods and tools that can be used to mitigate risk without slowing down development.
  • Runtime security across Kubernetes and AWS Fargate Recorded: Jan 10 2019 50 mins
    Liz Rice Technology Evangelist, Aqua Security
    Kubernetes enables you to run containerized workloads at scale on a cluster of virtual machines, while AWS Fargate offers a flexible way to run containers without having to manage servers. What are the best ways to protect these workloads against attacks? In this demo-rich chalk talk, including a live exploit, we explore how techniques like image scanning and runtime protection tools can provide innovative ways to control and secure your containerized applications, even when there is no way to directly access the hosts that they are running on.

    Please join us for this encore Chalk Talk delivered by Liz Rice at AWS Re:Invent
  • Cloud-Native Security at Scale: Multi-App, Multi-Cloud, Multi-Stack, Multi-Team Recorded: Nov 28 2018 44 mins
    Rani Osnat - V.P. Product Marketing, Aqua Security
    Containers and serverless adoption continues to expand, with the numbers of applications growing within enterprises. Many organizations now run multiple applications, across disparate teams, running on-prem or on different clouds, and requiring varying levels of security and compliance.

    Attend this webinar to learn how to better manage complex, multi-application, multi-cloud and multi-team enterprise environments with easy to manage policies, intuitive runtime visibility and role-based access control (RBAC) at scale.
  • Shift Left and Then Shift Up: Strengthening Your Security Posture Recorded: Nov 26 2018 54 mins
    Tsvi Korren - Chief Solutions Architect at Aqua Security
    The concept of “shift left” engages security earlier in the development cycle of cloud-native applications, accelerating development while reducing risk. However, migrating to cloud-native environments also necessitates the security team to “shift up”, focusing on the application layer to account for the shared-service model and “thin OS” environments that are prevalent in these environments.

    Attend this webinar to learn why Shifting Up provides improved security and cost efficiency in cloud-native environments, including:

    •Container environments
    •Containers as a Service (CaaS)
    •Serverless implementations
  • Secure DevOps: Fact or Fiction? Recorded: Nov 14 2018 62 mins
    SANS Jim Bird and Barb Filkins and Rani Osnat, Aqua Security
    A new survey of SANS practitioners has examined how security and risk management leaders will manage the collaborative, agile nature of DevOps to be seamless and transparent in the development process.

    In this webcast, Part 1 on the topic, SANS Analyst Authors Jim Bird and Barb Filkins will reveal how practitioners are handling evolving DevOps requirements and challenges, and how they're integrating security into the process.
  • Fast & Secure: Protect Kubernetes Apps on Google Cloud with Aqua Security Recorded: Nov 9 2018 43 mins
    Maya Kaczorowski (Google), Rani Osnat and John Michaelson (Aqua)
    Google said it themselves, “We are on a mission to make containers accessible to everyone, especially the enterprise.” But enterprises also need enterprise-grade security.

    Enter the Aqua Container Security Platform (CSP), the first consumption-based container runtime security solution available on the Google Cloud Platform (GCP) Marketplace.

    Aqua CSP is deployed onto your GKE cluster with one click. Once deployed, you get full lifecycle security for your container and Kubernetes-based applications, from image scanning to runtime and network controls.

    Attend this webinar and learn how to:
    • Protect GKE workloads while paying only for running nodes, per hour, via your monthly GCP bill.
    • Scan images in your pipeline and in the Google Container Registry, and ensure that only trusted images are deployed into production
    • Apply least-privilege security policies to your runtime environment to automatically detect and prevent malicious activity and container-related attacks
    • Segment services on your cluster with container-level firewalling
    • Integrate with Google’s Cloud Security Command Center for streamlined visibility
  • Securing Apps Across Containers & VMs - Ensuring Good Rather than Chasing Bad Recorded: Oct 25 2018 46 mins
    Nolan Karpinski with VMware and John Michaelson with Aqua Security
    As more businesses embrace modern, agile application development processes, implementing security at the speed of the business requires an approach that easily extends across both containers and VMs.

    Attend this webinar and learn how this integrated, highly scalable approach to securing VMs and containers through a combined solution allows security teams to visualize their security policy for VMs and containers within AppDefense, as well as view and respond to policy violations from Aqua within AppDefense.

    During this webinar, we’ll review:

    • Runtime assurance for containers that sends container context — called “runtime profiles” — to AppDefense
    • How this policy is visualized within AppDefense once it’s inherited from Aqua in order to rationalize policy across various services and modes of deployment.
    • Event identification and tracing in AppDefense
  • Preventive Security for Kubernetes Recorded: Oct 16 2018 47 mins
    Liz Rice Technology Evangelist, Aqua Security
    Aqua’s open source tools arm Kubernetes administrators and developers with an easy way to identify weaknesses in their deployments so that they can address those issues before they are exploited by attackers.

    During this webinar we’ll review how Aqua's open source tools offer preventive security for Kubernetes:

    •Kube-Bench: checks a Kubernetes cluster against 100+ checks documented in the CIS Kubernetes Benchmark.
    •Kube-Hunter: conducts penetration tests against Kubernetes clusters that hunt for exploitable vulnerabilities and misconfiguration - both from outside the cluster as well as inside it (running as a pod).
  • From Containers to Serverless: Keys to Securing Cloud-Native Workloads Recorded: Oct 10 2018 33 mins
    Ariel Shuper, Sr. Director of Product Management
    As your environment expands from managing your own containers to include Containers as a Service (CaaS) and Serverless, what are the new risks of abstracting the underlying infrastructure? What are the best practices for ensuring consistent policies and compliance across hybrid environments combining serverless and containers?

    During this webinar, we will explore the impact of CaaS and Serverless deployments on the enterprise security landscape and how to best protect applications regardless of where they run:

    •The attack vectors of serverless environments
    •The common practices which can be used across the different platforms
    •The unique steps to protect each workload type and environment
    •Why legacy security tools are not sufficient for microservices landscape

    You’ll walk away with a solid understanding of how to combat the inherent security challenges of Serverless architectures and micro-services landscape.
  • Google Cloud Platform - How to deploy Aqua onto your GKE cluster Recorded: Oct 4 2018 13 mins
    John Michaelson, Director of Partner Integrations
    This 12 minute video explains how to:
    •Protect GKE workloads while paying only for running nodes, per hour, via your monthly GCP bill.
    •Scan images in your pipeline and in the Google Container Registry, and ensure that only trusted images are deployed into production
    •Apply least-privilege security policies to your runtime environment to automatically detect and prevent malicious activity and container-related attacks
    •Segment services on your cluster with container-level firewalling
    •Integrate with Google’s Cloud Security Command Center for streamlined visibility
Insights, updates and latest news on container security.
With containers being the next major disruption in application technology, this channel features live and on-demand videos with insights, updates and latest news on container security. Watch any video at your convenience or sign up to our channel.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Using Containers for Hybrid Cloud & Cloud Migration
  • Live at: Oct 18 2017 6:00 pm
  • Presented by: Amir Jerbi, CTO and co-founder at Aqua Security
  • From:
Your email has been sent.
or close