Sysdig is a Representative Vendor in the 2024 Gartner® Market Guide for CNAPP
GET THE GUIDE
Frost & Sullivan 2024 Global Container/Kubernetes Security Company of the Year
GET THE REPORT
Meet Sysdig Sage: The first conversational AI cloud security analyst of its kind
LEARN MORE
Discover the top trends and insights in cloud-native usage and security
DOWNLOAD NOW
Products
Back
Products
Security
Sysdig Secure
CNAPP Powered by Runtime Insights
Observability
Sysdig Monitor
Kubernetes and Prometheus Monitoring
Platform – 3rd Column Header – Hidden
Runtime Insights
AI Workload Security
Sysdig Sage™ GenAI
Integrations
Pricing
Solutions
Back
Solutions
Security
Cloud Detection & Response
Vulnerability Management
Posture Management
Permissions & Entitlement
Server Threat Detection
Observability
Kubernetes Monitoring
Prometheus Monitoring
Custom Metrics
Cloud Monitoring
Cost Optimization
View All
Environments
Kubernetes & Containers
Serverless
Amazon Web Services
Google Cloud
Microsoft Azure
IBM Cloud
View All
Open Source
Back
Open Source
Open Source – 1st Column Header – HIdden
Sysdig and Open Source
Projects
Falco
Open Policy Agent
Prometheus
Why Sysdig
Back
Why Sysdig
Why Sysdig
About Us
Our Customers
Threat Research Team
5/5/5 Benchmark
2024 Cloud-Native Security & Usage Report
Runtime Insights Ecosystem
Compare Sysdig
Aqua
Crowdstrike
Lacework
Orca
Prisma Cloud
SentinelOne
Wiz
Resources
Back
Resources
Resources – 1st Column Header – Hidden
Blog
Cloud security thought leadership, industry insights, and Sysdig news
Threat Research
Latest threat research and news
Education
Content Library
Events & Webinars
Learn Cloud Native
Newsroom
Topics
Container Security
Cloud Security
Monitoring
Compliance
Support
Support
Sysdig Status
Documentation
Search
Back
Search for:
Search
Best Match
View all search results
Languages
Back
Language
Language Header – Hidden
Deutsch
English
Español
Français
Italiano
日本
Log In
Back
Log In
Monitor
US-East
US-West
EU-Central
AWS-AP-Sydney
AWS-AP-South
GCP-US-West
Secure
US-East
US-West
EU-Central
AWS-AP-Sydney
AWS-AP-South
GCP-US-West
Log In – 3rd Column Header – HIdden
Support
Get Demo
Events
Webinars
Webinars On-Demand
Workshops
Filter by Category
Events
Webinars
Webinars On-Demand
Workshops
Webinars
Upcoming Webinars
Who Stole My Cloud?
The cloud has become both the engine of progress and a playground for cybercriminals. As your cloud footprint grows, so does the complexity of securing it. Are you prepared for what’s next?
Oct 2, 2024 12 CEST | 11 PST
Defend at Cloud Speed: Automating Detection and Response with Sysdig and Google SecOps
Using Sysdig and Google SecOps, discover how to protect your organization against modern threats with real-time detection, full-context investigation, and automated response.
Oct 2, 2024 10am Pacific | 1pm Eastern
The Evolution of Cyber Threats: How Open Source Tools Are Changing the Game for Better and Worse
Discover how cybercriminals are shifting from traditional attack methods to more advanced, scalable tactics with OSS tools, and resources.
Oct 8, 2024 11am Pacific | 2pm Eastern
Ghosts in the Machine: Detecting Threats in Your Cloud
Join cybersecurity influencer Graham Cluley to uncover hidden cloud threats, master threat-hunting techniques, and explore chilling real-world security stories. Learn how to banish cyber ghouls and keep your cloud safe from lurking dangers.
Oct 31, 2024 10am Pacific | 1pm Eastern
SANS FALL CyberFest 2024
Supercharge your cybersecurity expertise! SANS Fall CyberFest is your chance to dive deep into the latest cybersecurity solutions, technologies, and techniques from the industry's top experts and solutions providers.
Nov 6 - 8, 2024
On-Demand Webinars
Filter By:
ON-DEMAND
CIS compliance for Azure
Sysdig performs threat detection for Microsoft Azure by analyzing this log data against a rich set of security rules based on open-source Falco.
ON-DEMAND
Manage Excessive Permissions and Entitlements in AWS
Organizations often grant overly permissive privileges to users and services that are often unused. This level of access exposes you, enabling adversaries to hack into the cloud and perform malicious activity.
ON-DEMAND
CrashLoopBackoff + Four Other K8s Troubleshooting Tips Everyone Should Know
In this webinar, we will cover some of the common problems that plague every Kubernetes user and show you how to fix them. We will explain why they happen and share some best practices that will make your life easier in the future.
ON-DEMAND
Say Goodbye to PSPs?! Migrate your PSP Rules to OPA with No Hassle
One of the best alternatives for Kubernetes users to mitigate PSP deprecation is through the built-in admission controller utilizing Open Policy Agent (OPA) rules.
ON-DEMAND
Reduce Alerts and False Positives – Monitor Golden Signals using Sysdig
In this deminar, we will cover why golden signals are important for modern distributed systems, how to monitor and set up alerts for Kubernetes applications using Sysdig.
ON-DEMAND
Containerized AppSec from Code to Production w/ Snyk, Sysdig and AWS
Snyk and Sysdig have partnered to help developers and security teams easily find and fix open source and container vulnerabilities in development, then analyze running workloads in production to identify vulnerable packages executed at runtime.
ON-DEMAND
Become a Certified K8s Security Specialist (CKS) in 2022! How to Pass with Saiyam Pathak, CNCF Ambassador
Join Sysdig and CNCF Ambassador Saiyam Pathak as we discuss key security concepts and tools, complemented with hands-on demo scenarios that will help you prepare for the CKS exam.
ON-DEMAND
Continuous Compliance on Azure
Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks.
ON-DEMAND
Protecting Against Log4j Attacks in AWS Fargate
Join us for a live demo of a Log4j attack on a Fargate task and how to detect it in real-time! We'll share best practices around detection and mitigation of the log4j vulnerability running in serverless environments.