background graphic

Sysdig Site Search

Showing 551-560 of 576

Data Notebook Company Supports Compliance and Shuts Down Advanced Attacks With a Single Solution

case studies

A leading data platform stopped 60+ daily cryptomining exploits and hit SOC 2 goals with Sysdig runtime insights.

Bloomreach Achieves 350% ROI with Sysdig

case studies

Bloomreach cut observability costs 40% and gained 350% ROI by replacing manual monitoring with Sysdig Monitor.

Lessons from the Trenches: Maintaining Effective Security in Cloud

webinars

ICG Consulting provides cloud hosting and managed security services for their financial back-office solution customers who want to deploy ICG’s applications without the usual headaches of complex cloud infrastructure.

SAP Concur Delivers Secure, Compliant Solutions to More than 50M End Users Globally

case studies

SAP Concur saved 10K+ hours with automated vuln and compliance checks, scaling secure delivery to 50M+ users.

Threat Detection and Response for AWS Fargate

webinars

In this session, Sysdig and AWS will discuss how to tackle the unique challenges of securing serverless environments.

Sysdig Inspect explained visually

Blog

Sysdig Inspect is an Electron based GUI for system call analysis. It can be run locally as a desktop application...

Not your Parent’s Cloud Security: Real-time Cloud Threat Detection for GCP

webinars

Google Cloud Audit Logs record administrative actions and configuration changes in your cloud account. How can you better use this resource in real-time to spot and prioritize cloud threats?

Becoming a Cloud Security Ninja: Slice Your SIEM Costs by Pre-Processing Cloud Logs

webinars

The cloud threat landscape has evolved with the complex, and dynamic nature of the cloud provider platforms and the multitude of services that are available with the click of a button.

26 AWS security best practices to adopt in production

Blog

Security is a fundamental pillar of the AWS Foundational Security Best Practices. To minimize security risks and protect your environment,...

5 Attack Tactics to Guard against using MITRE ATT&CK for AWS

webinars

How can you pull together a unified and simple approach to speed up detection and response for security across your AWS cloud workloads?

1 54 55 56 57 58

Stay up to date! Sign up to receive our newsletter.