Hi [[ session.user.profile.firstName ]]

Securing Containers for Production-Ready Environments

“Containers Are Not Just Small Virtual Machines; They Need New Security Strategies.” - Forrester report: Ten Basic Steps to Secure Software Containers, April 17, 2017.

While the rise of the Docker runtime environment and container format has brought standardization to container environment - according to the Forrester report, 31% of enterprise cloud developers are using containers during design and testing - risks to containers are on the rise as well. In this webinar, we will go over ten security steps to secure containers.

Join our webinar to learn how to:
• Secure containers now, before they put your customers at risk
• Understand the distinct security implications of the layered container stack
• Master the 10 tasks to protect your container environment

Aqua Security webinar featuring Forrester Research.
Recorded May 24 2017 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Amy DeMartine, Principal Analyst, Forrester Research and Rani Osnat, VP Marketing, Aqua Security
Presentation preview: Securing Containers for Production-Ready Environments

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Containers vs Serverless Security: What New Security Challenges Surfaced? Oct 10 2018 4:00 pm UTC 60 mins
    Ariel Shuper, Sr. Director of Product Management
    With the adoption of virtual containers, new security challenges surfaced. Dedicated tools to mitigate them emerged. Serverless, which started as “functions-as-a-service” shortly evolved into a new concept with a broad spectrum of services. Focusing on simplicity and agility, and by removing infrastructure concerns, serverless is revolutionaizing the cloud services landscape.

    Rinse. Repeat… New Security Challenges Surfaced.

    Is Serverless secure? What are the new risks of abstracting the underline infrastructure? What are the best practices for hybrid environments combining serveless and containers?

    During this webinar, we will explore the Serverless and Serverless Containers security landscape:

    •The attack vectors of serverless environments
    •The common practices which can be used across the different platforms
    •The unique steps to protect each workload type and environment
    •Why legacy security tools are not sufficient for microservices landscape

    You’ll walk away with a solid understanding of how to combat the inherent security challenges of Serverless architectures and micro-services landscape.
  • Securing Apps Across Containers & VMs - Ensuring Good Rather than Chasing Bad Sep 25 2018 4:00 pm UTC 45 mins
    John Michaelson, Cloud Integration Architect Aqua Security
    As more businesses embrace modern, agile application development processes, implementing security at the speed of the business requires an approach that easily extends across both containers and VMs.

    Attend this webinar and learn how this integrated, highly scalable approach to securing VMs and containers through a combined solution allows security teams to manage their security policy for VMs and containers within AppDefense, as well as view and respond to policy violations from Aqua within AppDefense.

    During this webinar, we’ll review:
    • Runtime assurance for containers that will send container context — called “runtime profiles” — to AppDefense
    • How to tune the policy from within AppDefense once it’s inherited from Aqua in order to rationalize policy across various services and modes of deployment.
  • Deploying a PCI DSS-Compliant Kubernetes Cluster Aug 29 2018 6:00 pm UTC 60 mins
    Katie Paugh – DevOps Lola, K.S. Root – Senior Operations Engineer Lola, Sigalit Kaidar– Director of Product Marketing Aqua
    Based on the great presentation by the Lola team @Boston-Kubernetes-Meetup#10, we’ve decided to expand this important conversation. We will be hosting a more detailed webinar on PCI DSS to show how you can deploy a Kubernetes cluster that meets these security standards (including GDPR and NIST mandates), while still maintaining DevOps agility.

    This dedicated session will cover tools used, obstacles we’ve encountered, and important design decisions we’ve made to maintain compliant, while still preserving an agile development process.
  • Embedding Security into Your Cloud-Native Pipeline Recorded: Aug 3 2018 53 mins
    Mostafa Siraj with Capital One and Rani Osnat with Aqua Security
    Embedding security into your cloud-native pipeline (SD Times)

    Aqua Security joins Mostafa Siraj with Capital One to talk about security for cloud native apps.

    In today's modern software factories, organizations are shifting security to the left. No longer just the purview of firewalls, security needs to be built in during development and deployment processes. By doing so, organizations can ensure they are limiting vulnerabilities getting into production while cutting costs of both downtime and code rework. Attendees will learn:

    •How to ensure that the use of open source doesn’t introduce vulnerabilities and other security risks
    •How to automate delivery of trusted images using a policy-driven approach
    •Empowering developers to secure their applications, while maintaining segregation of duties
    •Ensuring the consistent flow of images through the pipeline, with no side-doors or introduction of unvetted images
    •Enforcing immutability of containers, preventing container-image drift
  • Scanning Container Images for Package Vulnerabilities: A FreeTool from Aqua Recorded: Jul 23 2018 46 mins
    Liz Rice Technology Evangelist, Aqua Security
    A container image scanner looks at the software packages included in the image file system and checks it against a list of packages with known vulnerabilities - typically the NVD. Because this is a critical first step in assessing risks in containers before they deploy, Aqua offers a free-to-use tool for scanning your container images for package vulnerabilities.

    Aqua’s scanner - which is the same whether you’re using MicroScanner or our full Container Security Platform - looks at many sources, such as the distributions’ own security advisories, and information from software developers themselves, to keep track of these differences. Our scanner does manual checks to further eliminate false positives and false negatives - a less common, but important, occurrence.

    Attend this webinar to learn by way of demonstration how to use this tool for vulnerability scanning in container images and what makes it different from other scanner tools.
  • Enforcing Immutability & Least Privilege to Secure Containers: Red Hat OpenShift Recorded: Jul 19 2018 48 mins
    Tsvi Korren - Chief Solutions Architect at Aqua Security
    One of the benefits of using containers, especially in microservices-based applications, is they make it easier to secure applications via runtime immutability—or never-changing—and applying least-privilege principles that limit what a container can do.

    With immutability, every attempt to change the runtime environment is interpreted as an anomaly. And, thanks to containers’ simplicity, it is easier to predict their behavior in the application context and create a tight security envelope, allowing them to perform only their required function and preventing behaviors outside that scope.

    In this webinar, Tsvi Korren, Chief Solutions Architect at Aqua Security, will explain and demonstrate how an approach that enforces immutability and least privilege can secure applications in an active container environment.
  • Protéger vos applications conteneurisées du développement à la produ Recorded: Jun 28 2018 39 mins
    Webinaire Devoteam + Aqua Security
    Ce webinaire va se concentrer sur la manière de sécuriser les conteneurs dans n’importe quel environnement IT tout en maintenant une haute disponibilité des services. Nous aborderons les défis en terme de sécurité de tels environnements et comment protéger les applications dans les conteneurs, de leur développement à la production en utilisant des contrôles de sécurité, des secrets et des accès en se référant aux standards de sécurité et de compliance (CIS, NIST… ).

    Ce webinaire est principalement destiné à :
    -Les administrateurs de la sécurité et les architectes qui veulent en savoir plus sur les risques et les avantages de l'utilisation des conteneurs, et comment les sécuriser efficacement
    -Les équipes de développement d'applications et les équipes DevOps qui souhaitent proposer des applications plus sécurisées
  • MicroScanner: Free Image Vulnerability Scanning Plugin for Jenkins Recorded: Jun 25 2018 4 mins
    Rani Osnat
    This is a 3 minute "how it works" demo of the free Aqua MicroScanner Jenkins plug-in vulnerability scanner that you can embed into the dockerfile and automate scanning during image build.

    Please refer to the attachment section to get the link to download the Microscanner.
  • Kubernetes – How to Prevent Attacks with Admission Controllers Recorded: Jun 19 2018 34 mins
    Benjy Portnoy, CISSP, CISA, and Rani Osnat, VP Product Marketing at Aqua Security
    This is an expanded version of what was presented at the KubeCon Lightning Talk

    An admission controller intercepts requests to the Kubernetes API server prior to persistence of the object. By applying proper admission controls in your Kubernetes cluster, it's possible to generate deployments that adhere to the least privilege model, limiting user and container activity based on their business usage needs.

    In this session, we will review the latest and greatest Kubernetes 1.10 admission controller capabilities. We will demonstrate in a live demo a dynamic admission control webhook that can be customized to limit privileged user access.

    You’ll walk away understanding how to make such standards easier to implement and methods for going beyond them to provide security worthy of critical applications in production.
  • Running Workloads with Privileges = Running with Scissors Recorded: May 31 2018 36 mins
    Liz Rice Technology Evangelist, Aqua Security
    This webinar is an encore/expanded version of Liz Rice’s keynote address from KubeCon in Copenhagen held May 2018

    During this webinar we’ll explore some common risks that many users are - often unknowingly - taking with their cloud native deployment by running workloads with more privileges than they need.

    Liz Rice, Container Technology Evangelist, will demonstrate how containers run as root by default, and show by example why this is something you should try to avoid.
  • Improve Security with Automated Image Scanning Through CI/CD Recorded: May 25 2018 25 mins
    Liz Rice Technology Evangelist, Aqua Security
    When it comes to securing an application deployed on Kubernetes, automation through a CI/CD pipeline is key. Using cloud-native security tools that hook right into Jenkins or your favorite CI/CD tool, enterprise security teams can set policies for developers who are building container images. The pipeline enforces those policies through automated vulnerability scanning of each image during the build process. Developers only deploy images that the security team is confident in because they’ve been scanned.
  • Protect your Containerized Applications from Build to Production Recorded: May 11 2018 31 mins
    Tsvi Korren - Chief Solutions Architect at Aqua Security
    This webinar focuses on how to secure container workloads across any IT environment while maintaining high availability of services.

    We will cover the unique security challenges of such environments and how to protect containerized applications from build to production using container-native security controls, secrets and access management according to security and compliance mandates (e.g. CIS, NIST).

    This webinar is mainly intended for:

    ●Security admins and architects who want to learn about the risks and benefits of using containers, and how to secure them efficiently
    ●Application development teams and DevOps teams who want to deliver apps that are more secure out of the gate
  • Security Lessons Learned from Peers on Hybrid Cloud Environments Recorded: Apr 11 2018 42 mins
    Doug Cahill Senior Analyst Cybersecurity at ESG | Sigalit Kaidar Director of Product Marketing Aqua Security
    As container adoption is accelerating, the need for container-native security controls that span any environment (multi-cloud, on-premise) is increasing. This webinar, based on results of a survey conducted by ESG, zeros in on the disparity between containerized application deployment plans, to the level of threats facing organizations, and the ensuing lack of sufficient security controls and skills to deal with these challenges.

    Learn from IT colleagues about current top challenges and their plans to incorporate container security controls in hybrid cloud environments. During this webinar, we’ll review:

    •Top attacks organizations are experiencing
    •Operational and readiness gaps mapped to actions
    •A proven container security framework
  • Container Security in the Enterprise Recorded: Mar 27 2018 48 mins
    Adrian Lane, Analyst and CTO at Securosis, and Amir Jerbi, co-founder and CTO at Aqua Security
    Following an extensive research update for 2018, join Adrian Lane, CTO at Securosis, and Amir Jerbi, CTO at Aqua Security, for an in-depth look at container security challenges, best practices, and benefits of deploying containers with security in mind.

    While a lot has changed and improved in the container ecosystem, enterprises are still trying to find the most effective ways to ensure security and compliance. Having researched this topic in 2016, and once again in recent months, Adrian will provide insights into key areas:
    How security risks shift in the era of containers, making traditional security tools insufficient key areas to focus on, including the build pipeline, container contents, host security, runtime security, monitoring, and auditing.
  • Securing Kubernetes at Scale Recorded: Mar 14 2018 45 mins
    Benjy Portnoy, Director of DevSecOps, and Rani Osnat, VP Product Marketing
    Join Aqua security to learn how to secure modern Kubernetes-based applications in an effective and scalable way.
    Kubernetes 1.8 and 1.9 introduced many security constructs that make it possible to secure Kubernetes deployments better than ever. However, recent incidents such as the highly publicized crypto-mining breach at Tesla demonstrate that without adhering to best practices and without proper implementation, Kubernetes-based applications are at risk. In this webinar we will cover this hot topic and demonstrate how to properly secure Kubernetes environments using both K8S-native, open source and commercial tools such as the Aqua Container Security Platform:
    - Embedding and automating security into the CI/CD pipeline
    - Implementing best practices to harden Kubernetes clusters and nodes
    - Using fine-grained access controls to ensure users only have minimal privileges
    - Leveraging Kubernetes constructs (namespaces, deployments) to improve network security
    - Monitoring Kubernetes applications at runtime to detect anomalies
  • Containers: Real-world Solutions for Networking, Security, & Storage Recorded: Feb 28 2018 56 mins
    Gou Rao,Portworx; Rani Osnat, Aqua Security; Bala Ramachandran, Big Switch Networks
    IT organizations are leveraging containers to accelerate cloud-native application delivery, improve development agility, and increase operational efficiency. With this highly-distributed and dynamic application environment, infrastructure components such as networking, storage, and security need to be dynamically managed to operate at the speed of containers. By leveraging software-defined technologies and industry-standard interfaces to support orchestration systems such as Kubernetes, Big Switch’s SDN Fabric, Portworx cloud native storage and Aqua’s security platform overcome these challenges to offer a production-grade solution to deploy and manage containers at scale.

    Watch this recorded webinar to learn why large customers have selected these solutions as the optimal architecture for their container-driven digital transformation. In this webinar, we cover:
    BIG QUESTION #1: How does Big Switch’s Big Cloud Fabric leverage SDN and Container Network Interface (CNI) plugin to simplify network operations and to enhance container visibility?
    BIG QUESTION #2: How can teams get the benefits of Kubernetes storage primitives for dynamic storage provisioning without sacrificing enterprise storage fundamentals such as performance & class of service, HA, backups, snapshots, automated upgrades, and security. BIG QUESTION #3: How can you automate security controls for container deployments, addressing risk and compliance needs, while improving application security well beyond that of traditional applications?

    Joining moderator, Kate Lehman, Head of Communications, Big Switch Networks on the panel are Gou Rao, CTO, Portworx; Rani Osnat, VP Product Marketing, Aqua Security; and Bala Ramachandran, Director of Product Management, Big Switch Networks.
  • Cover Your Base Images: How Early Development Choices Impact Security Recorded: Dec 6 2017 17 mins
    Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security
    Security risks, configuration mistakes, and vulnerabilities in Docker images are often traced to some very early decisions. Before containers, developers could count on the security of the infrastructure, including the operating system and prerequisite components. Dev owned the security of the application--Ops owned what it ran on. This is not the case anymore. Today, development owns the choice of the base operating system, the configuration of the final image, and sourcing all the components used for the build. In order to produce secure and compliant applications, development and operations should work together to establish a practice that secures the base images, reviews configuration at time of build and provides a known risk posture for each image and running container.

    This webinar will guide you through building applications on a secure foundation, performing a risk analysis of your final product, and prepare you to handle compliance requirements.
  • Container Security 101 Recorded: Nov 7 2017 41 mins
    Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security
    Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
    Join our webinar to learn:
    •What are containers?
    •How to use containers?
    •What are the security challenges they introduce?
  • Using Containers for Hybrid Cloud & Cloud Migration Recorded: Oct 18 2017 40 mins
    Amir Jerbi, CTO and co-founder at Aqua Security
    The main benefits of containers vary from speed of development and deployment to scalability, flexibility, and cost-effectiveness – which is what made containers so popular today. But the ability to move containerized applications among different environments, from a public to private cloud for example, is one of the most important benefits of containers, making them enterprise favorites for cloud migration and hybrid cloud architectures.
    In this webinar, we will talk about how to use containers in a hybrid cloud, specifically:
    1.How containers make it easy to migrate and move applications between clouds
    2.What architectural considerations and tooling you need to achieve portability
    3.How to ensure consistency of control, security, and compliance across container cloud deployments
  • Securing Kubernetes Environments Recorded: Aug 9 2017 32 mins
    Liz Rice, Technology Evangelist and Michael Cherny, Head of Security Research
    The Center for Internet Security (CIS) recently published a Benchmark specification for securing Kubernetes host machines.

    In this webinar we will take a closer look at the CIS Kubernetes Benchmark, and discuss how Kubernetes users can apply best practices from the Benchmark in their own deployments. We will cover aspects of secrets management, user authentication and authorization and the use of least privileges. We will end up with a demonstration of our very own kube-bench, an Open Source tool for testing benchmark compliance.

    Join Michael Cherny, Head of Security Research and Liz Rice, Technology Evangelist, to learn about practical actions you can take to make your Kubernetes deployment more secure.
Insights, updates and latest news on container security.
With containers being the next major disruption in application technology, this channel features live and on-demand videos with insights, updates and latest news on container security. Watch any video at your convenience or sign up to our channel.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Containers for Production-Ready Environments
  • Live at: May 24 2017 6:00 pm
  • Presented by: Amy DeMartine, Principal Analyst, Forrester Research and Rani Osnat, VP Marketing, Aqua Security
  • From:
Your email has been sent.
or close