Use PROMETHEUS? Take our survey: https://www.surveymonkey.com/r/8SYCDQB
Developers have numerous options for instrumenting code to monitor and troubleshoot application performance. When should you turn to custom metrics like Prometheus, statsd and JMX? When are tracing and APM the right fit? How do these solutions compare?
Join us for our online session to learn:
- The advantages and disadvantages of different approaches for application performance monitoring
- When you should choose one solution over another and what the best use cases are for each
- How to consolidate monitoring and accelerate troubleshooting when using multiple options
RecordedJul 31 201833 mins
Your place is confirmed, we'll send you email reminders
Stephane Woillez / Technical Sales Lead South Europe / Sysdig Inc.
Pour sécuriser les conteneurs, il faut tester la vulnérabilité des images ; il faut aussi s’assurer que les clusters d’exécution ne sont pas attaqués. Pour détecter les comportements anormaux sur le run, on peut utiliser Falco, un moteur de détection d’intrusion Open Source très populaire en environnement Kubernetes. Dans ce webinar, vous allez découvrir le fonctionnement de Falco, comment l’installer, le configurer, le tester et le personnaliser. Vous comprendrez aussi comment le déployer en production à l’échelle, en environnement multi clouds, avec la plateforme Sysdig Secure.
Kiley Williams, Polyverse | Dan Juengst, Red Hat | Michael Ewald, Contino | Pawan Shankar, Sysdig
With the widespread adoption of containers (Docker, Lambda, Kubernetes) and DevOps practices, IT teams are able to make their cloud application more portable and scalable than ever before. But as containers and DevOps have taken over, so too has the need for a new approach to security. Containers, workloads, and APIs need proper protection and it all boils down to your cloud security strategy.
Tune into this live roundtable panel at AWS re:Invent as they discuss the following:
- Workload attacks and why container orchestration tools such as Kubernetes might be at risk
- Secure container deployment on AWS
- Authentication and APIs: why they're important and best practices
- Continuous monitoring and file system security
Panelists:
Dan Juengst, Senior Principal Technology Evangelist, Red Hat
Michael Ewald, Director of Engineering, Contino
Pawan Shankar, Sr. Product Marketing Manager, Sysdig
Christian Posta, Solo.io and Dan Papandrea, Sysdig
Going to cloud native application architectures introduces its own set of problems such as how to deal with elastic compute infrastructure, untrusted networks, and increased complexity. Chief among the problems to solve in this new landscape is securing your data and services and troubleshooting when things go wrong. Field CTOs from Sysdig and Solo.io show how the integrated use of their technologies help solve these challenges in application modernization projects.
Your team is rapidly adopting Kubernetes. Security and compliance controls must be in place before you deploy applications in production. Feel like you could use some support putting together your security plan? Spend 45 minutes and that’s what you’ll get:
--Practical advice on what security functions enterprises are integrating into DevOps workflows
--Real world examples of how cloud teams are using tools to secure Kubernetes in production
--Walk away with the checklist you need to create your game plan
Chetan Mehendiratta, Vice President of Engineering at Goldman Sachs & Janet Matsuda and Knox Anderson of Sysdig
Quickly ramping your move to containers and Kubernetes for app deployment is critical. You need to be confident you can achieve security, compliance and production-grade app availability.
Join us for a real-world perspective on deploying containers in production. Plus, hear new ways to incorporate native Kubernetes security capabilities in your DevOps workflow.
You’ll hear:
--Best practices and new capabilities for securing Kubernetes and containers
--Straight talk based on experience ramping container environments into production
--Practical examples of how to apply tools to handle Kubernetes at scale
--Ways DevOps pros are monitoring their environment for performance, capacity and security
Chetan Mehendiratta, Vice President of Engineering at Goldman Sachs & Janet Matsuda and Knox Anderson of Sysdig
Quickly ramping your move to containers and Kubernetes for app deployment is critical. You need to be confident you can achieve security, compliance and production-grade app availability.
Join us for a real-world perspective on deploying containers in production. Plus, hear new ways to incorporate native Kubernetes security capabilities in your DevOps workflow.
You’ll hear:
--Best practices and new capabilities for securing Kubernetes and containers
--Straight talk based on experience ramping container environments into production
--Practical examples of how to apply tools to handle Kubernetes at scale
--Ways DevOps pros are monitoring their environment for performance, capacity and security
Stephane Woillez, Technical Sales Lead South Europe, Sysdig Inc.
De plus en plus d’entreprises qui utilisent Kubernetes en production n’anticipent pas son impact inévitable sur la sécurité et le monitoring des infrastructures. Venez vous informer sur les bonnes pratiques pour mettre en oeuvre et renforcer la sécurité de Kubernetes en production à mesure que les architectures “cloud-native” et l’approche Devops se développent.
Eric Carter, Director of Product Marketing, Sysdig
What are companies really doing with their containers? What do they find most appealing? How has the landscape changed over the past year?
Join Sysdig as we present our 2019 Container Usage Report. We’ll take our annual look at more than 300,000 real-world container deployments, and you’ll learn the top applications being containerized, the security threats at play, and the degree to which enterprises are adopting Kubernetes and containers.
Stephen Elliot, Vice President, IDC and Eric Carter, Director of Product Marketing, Sysdig
The use of cloud-native technologies such as containers, microservices, and Kubernetes brings security and monitoring challenges that IT executives must overcome to reap the benefits. Gaining insight and control across the full stack are critical to reducing risk and delivering the business outcomes you expect.
Join IDC and Sysdig to learn how enterprises across verticals like financial services, healthcare, information technology, and transportation are achieving significant business results with unified security and monitoring – including payback in only 5 months.
In this webinar you’ll learn:
-How Sysdig users achieved average annual benefits of over $4M
-How deep security and visibility increase operational efficiency by nearly 50%
-How greater health, risk, and performance insights improve user productivity as much as 65%
Christian Posta, Solo.io and Dan Papandrea, Sysdig
Going to cloud native application architectures introduces its own set of problems such as how to deal with elastic compute infrastructure, untrusted networks, and increased complexity. Chief among the problems to solve in this new landscape is securing your data and services and troubleshooting when things go wrong. Field CTOs from Sysdig and Solo.io show how the integrated use of their technologies help solve these challenges in application modernization projects.
Varun Tagore Korrapati, DevOps Architect, Steelcase and Eric Carter, Dir. Product Marketing, Sysdig
How does DevOps fit with a 100-year-old furniture company? What role does Kubernetes play?
Join us to hear how Steelcase is pioneering digital innovation to create great experiences for its customers, expand revenue, and increase market share. We’ll discuss how the combination of containers, Kubernetes, and public cloud helps the company move quickly and maintain its competitive edge.
In this session we’ll cover:
-Why Steelcase chose to embrace modern DevOps practices
-How Kubernetes helps the company develop and deliver its IoT and analytic apps faster
-How shifting to microservices changed monitoring and security requirements
-Advice on successfully running cloud-native services in production
Jorge Salamero Sanz, Director of Technical Marketing
Security is one of the biggest challenges in the day 2 operations journey for the cloud-native stack. New paradigms like containers, microservices and hybrid cloud workloads disrupt the way enterprises implement security processes.
In this webinar, Sysdig shares the five (5) most important steps for securing applications and implementing DevSecOps processes in the OpenShift container platform. You will learn how to:
--Orchestrate Red Hat OpenShift platform security features
--Integrate vulnerability management across your CI/CD pipeline and software supply chain
--Manage regulatory compliance, audit, and risk
--Detect and respond to security incidents performing forensics
--Maintain visibility into containerized apps to provide reliable operations
You will walk away with a bunch of ideas for how to set up guardrails for your DevOps team and enable your organization to move more applications into the OpenShift platform with confidence and success.
Who Should Attend:
--Those who have completed OpenShift 101
--Cloud-native Enterprise / Security / System Architects
--DevOps & Site Reliability Engineers (SRE)
--Security Analysts, Compliance Managers, and Incident Responders
As more companies scale their Kubernetes deployments, they face growing security challenges. With so many options for security, we recently published a blog post to compare and contrast 33 Kubernetes Security tools: https://sysdig.com/blog/33-kubernetes-security-tools/
But, there is so much more to share.
Join the author, Mateo Burillo, for this session where he’ll talk through the Kubernetes security best practices and security platforms outlined in his blog post. You’ll walk away with a strong understanding and comparison of security tools in three phases to protect your Kubernetes deployments, so you can choose the right ones for your organization.
Michael Ducy, Director of Community & Evangelism, Sysdig
The Falco community is celebrating three years of container protection from this open source run-time security project, born out of Sysdig and now part of the Cloud Native Computing Foundation. The project has come a long way since its initial release in 2016. We’ll cover those early days and talk about how the project - and the world of container security - has grown over the years. We’ll also share the latest updates on Falco, including: adoption, ways it's being used, newly released features, and the upcoming roadmap. Whether you’re new to the world of container security or a seasoned expert, you’ll want to join to learn more about how Falco is evolving as the standard for container run-time security.
As cloud-native adoption continues to accelerate in enterprises, organizations are increasingly gripped with the challenge of operating Kubernetes and container-based microservices in production. While these technologies have made it possible for developers to more quickly iterate and deliver their software, the operational challenges involved with this new platform presents a host of new challenges unlike anything enterprises have faced in the past.
With such challenges, however, come great opportunities to radically rethink past problems and inefficiencies. Containerized, cloud-native platforms are no exception.
Join us for this webinar, as we look at how core users of Sysdig’s visibility and security platform are leveraging our new release, focusing on:
-The DevOps and Infrastructure team
-The Security team
-The Service Owner and their developers
An increasing number of enterprises are leveraging Kubernetes in production, yet do not foresee the inevitable changes to their infrastructure security and monitoring. As cloud-native architectures and a DevOps approach to development grow, learn more about best practices for implementing and scaling Kubernetes security in your organization.
With the rise of technologies like Docker, Kubernetes, and underlying cloud infrastructures, enterprises are moving towards cloud-native architectures that leverage microservices to run their critical business applications. While this shift has tremendous business advantages, it also creates significant security and compliance challenges.
In this webinar, Sysdig & AWS experts will explore the 4 key steps you must take to ensure you are continuously meeting your security and compliance requirements for your microservices stack. Learn how to:
>Leverage compliance policies for scanning images in your CI/CD pipeline
>Scan Kubernetes and Docker environments and visualize compliance posture
>Enforce runtime container compliance
>Investigate policy violations post-mortem by using forensics after container is disposed
Sysdig experts: Eric Carter – Director of Product Marketing & Narayan Iyengar – Product Manager
Modern apps built from isolated and often short-lived processes can leave blind spots in security and performance visibility. Join Sysdig to learn how tapping into Linux-native eBPF helps enable deep observability for your containers, hosts, networks, and more.
In this session we’ll discuss:
--What eBPF is and how it’s being used to deliver insight into cloud-native environments
--How Sysdig uses eBPF for deep views into your containers, infrastructure, applications and events
--Capturing detailed system activity for performing forensics and troubleshooting
--Why eBPF is key to securing and monitoring purpose-built container platforms like Container-Optimized OS (COS) from Google Cloud and Project Atomic Host
Eric Carter, Director of Product Marketing, Sysdig & Shadi Albouyeh, Offering Manager, Developer Services - IBM Cloud
If you’re involved with developing applications, chances are you’re being tasked with adapting to cloud-native infrastructure and being able to support cloud-native workloads with solutions like containers and Kubernetes. Join this discussion with Sysdig and IBM Cloud, who have recently built a partnership focused on improving monitoring and troubleshooting for your modern DevOps services. Together, IBM and Sysdig have launched a new offering that provides end-to-end monitoring capabilities in the IBM Cloud. You’ll come away with a better understanding of key visibility challenges and solutions that will help you successfully deliver the apps that drive your business.
Kubernetes is now 3.5 years old, the technology has matured, and adoption of containerized applications orchestrated by Kubernetes has scaled beyond tiger teams.
Enterprises are more comfortable with Kubernetes, and by default, more comfortable with containers.
We predict that is only the beginning: Enterprises will migrate mission-critical, stateful applications to Kubernetes in droves in 2019. As a result, security and operational visibility needs are growing. Solutions that support enterprise-level capabilities, processes, and support become the requirement.
Join an expert panel to:
-hear observations and insights from KubeCon
-learn about key usage data and trends
-understand how Kubernetes and other open source and commercial technologies are evolving in the enterprise
Run Cloud-Native Workloads In Production With Confidence
As cloud native becomes the standard for application deployment, IT roles must adapt. Cloud teams are taking ownership for security, as well as application performance and availability. Tools must support a secure DevOps workflow to run Kubernetes and containers in production.
Sysdig enables companies to confidently run cloud-native workloads in production. With the Sysdig Secure DevOps Platform, cloud teams embed security, maximize availability, and validate compliance. The Sysdig platform is open by design, with the scale, performance, and usability enterprises demand. The largest companies rely on Sysdig for cloud-native security and visibility. Learn more at www.sysdig.com.