Hi [[ session.user.profile.firstName ]]

20 Docker Security Tools Compared

There are quite a few Docker security tools in the ecosystem; how do they compare?

Everyone starts with image vulnerability scanning, but that's just the beginning and usually stops where your CI/CD pipeline ends. That’s why we created this extensive list of 20 container and Docker specific security tools that can help keep containers secure in production. https://sysdig.com/blog/20-docker-security-tools/

We got lots of feedback and questions from many of you, so we decided to pick some of the most popular open source tools and commercial products, look at them in detail, and show them to you live in a webinar.

Join Knox and Jorge from the Sysdig Team, for a 1 hour session to run through:

-How to secure Docker containers and what are the best practices
-Why you need to both static and dynamic (run-time) scanning for your images
-What other container security measures and policies are necessary in production

Demo: Comparing and implementing docker security basics with the most popular container security tools
Recorded Jan 25 2018 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jorge Salamero Sanz and Knox Anderson
Presentation preview: 20 Docker Security Tools Compared

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Monitoring Kubernetes with kube-state-metrics Mar 1 2018 6:00 pm UTC 60 mins
    Eric Carter, Product Marketing & Jorge Salamero Sanz, Technical Marketing
    Kubernetes simplifies deployment, scaling and maintenance of container-based services within and across clouds. At the same time, its dynamic nature adds complexity to app and infrastructure monitoring and troubleshooting. How can you ensure visibility into the health of application services in addition to the Kubernetes cluster itself?

    Using Kubernetes metadata and metrics - including kube-state-metrics - you can get critical insight into how your cluster is performing to ensure your users get the best experience.

    Join us for this webinar to discover how to effectively monitor Kubernetes. In this session we will discuss and demo:

    - How to correlate infrastructure, container, and orchestrator metrics for a complete picture of service performance
    - How to use kube-state-metrics to answer important questions about the condition of your Kubernetes cluster
    - How to detect, troubleshoot and resolve common scenarios you will face in your Kubernetes-based cloud
  • Container Forensics & Troubleshooting with Sysdig Inspect Feb 28 2018 10:00 am UTC 60 mins
    Jorge Salamero Sanz, Technical Marketing Manager, Sysdig
    Join us for a 1 hour use-case driven training session on container forensics, postmortem analysis and error troubleshooting with the Sysdig open source tool, Sysdig Inspect.

    In this session, we'll demo:

    -How to troubleshoot a 502 Bad Gateway error on HAproxy

    - A postmortem analysis to understand how a hacker broke into your containerized app

    - How to do deep forensic analysis and understand how your system was breached and what data was taken
  • Sysdig Secure Overview Feb 27 2018 6:00 pm UTC 60 mins
    Knox Anderson, Product Marketing Manager, Sysdig
    Learn how you can simplify and strengthen your container security posture by combining deep kernel-level container visibility with metadata from your container orchestration tools to define your policies.

    We'll cover how the security landscape is changing, the architecture of Sysdig Secure, we will show you live how to instrument your containerized environment and then do something you'll never see from any other security tool!

    During the live demo will walk you through what Sysdig Secure can do:

    -Implement application and service aware policies
    -Block incoming attacks and container break-ins
    -Audit executed commands
    -Intrusion forensics: pre and post attack investigation
    -Unify monitoring & security workflows
  • Sysdig Monitor Overview Feb 22 2018 6:00 pm UTC 60 mins
    Eric Carter, Director, Product Marketing, Sysdig
    Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?

    Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:

    - How to monitor services and apps built on top of containers
    - The benefits of transparent instrumentation for metric collection
    - Using dashboards to quickly see and share performance data
    - How to quickly determine the what and the why of what’s happening in your environment
  • Container troubleshooting with Sysdig Recorded: Feb 15 2018 45 mins
    Jorge Salamero Sanz, Technical Marketing Manager, Sysdig
    SSHing into a container for troubleshooting or burdening it with additional monitoring tools is kind of an anti-pattern. But… you still want to have full control, traceability and visibility right? Containers are highly volatile, how can you do this if your container doesn’t exist anymore?

    Sysdig uses Linux tracepoints to collect and then process and filter kernel system calls and events. Still this requires a deep knowledge on a tcpdump like filtering syntax and understanding on the syscalls involved. Sysdig Inspect makes our deep dive into system calls much more intuitive and visual though a graphical user interface that allows to correlate high level activities like containers, processes, containers, network or file I/O and commands, events or logs.

    In this webinar series you will get to know how Sysdig and Sysdig inspect works through a series of practical examples:

    -Exploration and performance analysis of container, processes, network and file activity on a typical Wordpress setup
    -Debug a 502 HTTP error on a load-balanced Python app with HAproxy
    -Troubleshoot a Kubernetes CrashLoopBackOff error

    Who should attend?

    If you're managing containers in production, using containers for development or just beginning our container exploration, you'll want to attend to understand the challenges of troubleshooting system or application errors when running inside containers.
  • Docker Monitoring: Best Practices for Optimal Efficiency Recorded: Feb 8 2018 49 mins
    Eric Carter, Product Marketing Manager, Sysdig
    Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.

    Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.

    During this webinar you’ll learn:
    - How should you monitor services built on top of containers?
    - What metrics become more relevant in Docker-based environments?
    - How do you construct alerts most effectively?
    - How do you troubleshoot containers that are rapidly coming and going?

    The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
  • 20 Docker Security Tools Compared Recorded: Jan 25 2018 39 mins
    Jorge Salamero Sanz and Knox Anderson
    There are quite a few Docker security tools in the ecosystem; how do they compare?

    Everyone starts with image vulnerability scanning, but that's just the beginning and usually stops where your CI/CD pipeline ends. That’s why we created this extensive list of 20 container and Docker specific security tools that can help keep containers secure in production. https://sysdig.com/blog/20-docker-security-tools/

    We got lots of feedback and questions from many of you, so we decided to pick some of the most popular open source tools and commercial products, look at them in detail, and show them to you live in a webinar.

    Join Knox and Jorge from the Sysdig Team, for a 1 hour session to run through:

    -How to secure Docker containers and what are the best practices
    -Why you need to both static and dynamic (run-time) scanning for your images
    -What other container security measures and policies are necessary in production

    Demo: Comparing and implementing docker security basics with the most popular container security tools
  • Container Runtime Security with Sysdig Falco Recorded: Jan 24 2018 40 mins
    Michael Ducy, Director of Community and Evangelism, Sysdig
    While there have been many improvements around securing containers, there is still a large gap in monitoring the behavior of containers in production and taking action on any abnormal behavior. That’s why we created Sysdig Falco, the open source behavioral activity monitor for containerized environments.

    Sysdig Falco can detect and alert on anomalous behavior at the application, file, system, and network level. In this webinar attendees get a deep dive into Falco and learn:

    -How does behavioral security differ from existing security solutions like image scanning?

    -How does Falco work?

    -What can it detect?

    -How to build and customize rules.

    -How to extend with alerting options.

    Who should attend?

    If you're managing containers in production, or just beginning our container exploration, you'll want to attend to understand the security paradigms of containers and how to secure them.
The Container Intelligence Company
Sysdig is the container intelligence company. We have created the only unified platform to deliver monitoring, troubleshooting, and security in a microservices-friendly architecture. Our open source technologies have attracted a community of over a million developers, administrators and other IT professionals looking for deep visibility into systems and containers. Our container intelligence platform monitors and secures millions of containers across hundreds of enterprises, including Fortune 500 companies and web-scale properties. Learn more at www.sysdig.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 20 Docker Security Tools Compared
  • Live at: Jan 25 2018 6:00 pm
  • Presented by: Jorge Salamero Sanz and Knox Anderson
  • From:
Your email has been sent.
or close