Webinars

Search Results 161 - 172 of 394

On-Demand Webinar

Modernize and Secure DevOps with Confidence

Join AWS & Sysdig as we unpack and offer answers about where you can focus your efforts to modernize DevOps and provide key business benefits, such as speed, agility, and cost savings.  

On-Demand Webinar

Align Your Cloud Security Plan with the Cybersecurity Exec Order

Global security breaches and the White House Executive Order (EO) have sped up the timeline to modernize cybersecurity for both the public and private sectors. The way applications are developed and deployed (in the cloud and on containers), means taking a look at cloud security, Zero Trust architectures, and regulatory compliance in order to meet the mandates, keep moving ahead of the hackers and reduce risk.

Report

2022 Cloud-Native Security and Usage Report

Sysdig 2022 Cloud-Native Security and Usage Report digs into how Sysdig customers of all sizes and industries are using and securing cloud and container environments. We examined the data and found some interesting trends this year that may help as you work to develop best practices for securing and monitoring your cloud-native environments.

On-Demand Webinar

Continuous Compliance on AWS

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks. 

On-Demand Webinar

Cloud and Container Runtime Security on AWS

Join us to learn how Sysdig Secure extends the open-source Falco runtime security engine, and saves time creating and maintaining runtime policies. Our rules map to MITRE ATT&CK framework, NIST and PCI, along with other container/Kubernetes runtime detection and cloud security threat policies.

Whitepaper

Sysdig Platform Architecture Guide

The Sysdig Secure DevOps platform embeds security, compliance, and monitoring into your DevOps workflow. It is the only unified container security and monitoring platform.

On-Demand Webinar

Scale up Threat Detection, Scale Down False Positives in the Cloud

The cloud vendors offer hundreds of cloud services your team may be using. How can you identify threats across these services without drowning in a sea of alerts? Join us to learn how to scale up threat detection and scale down false positives in the cloud.

Brief

6 Considerations for Kubernetes Capacity Planning

Proper resource planning and capacity optimization will allow you to operate Kubernetes with predictability and will improve system resilience. To do this, you will need deep visualize and correlation of all the metrics in your Kubernetes environment.