Webinar

Our weekly webinars cover the latest developments and trends in Kubernetes security and observability.

October 4, 2022
Four steps to faster troubleshooting of microservices and containers in a Kubernetes
Americas
10:00 am 11:00 am PDT
As enterprises adopt containers and Kubernetes, the growing complexity of workload-to-workload communication along with rapid delivery of applications requires a new approach to visibility when it comes to securing Kubernetes clusters. Service breakdown, performance hotspots, security policy violations and gaps, along with faster troubleshooting and time to resolution, require a...
September 27, 2022
Managing Security and Observability for Multi-Cluster Kubernetes Deployments
Americas
10:00 am 11:00 am PDT
In order to scale their cloud-native applications and make them feature-rich, organizations are using multiple clouds, each for the different services (e.g. ML, database, compute, etc.) offered. Because different cloud providers offer different services, it’s difficult to use only a single distro or cloud. This creates an ordeal for platform...
September 20, 2022
Defending your containerized application with runtime security
Americas
10:00 am 11:00 am PDT
DevOps and security teams need a unified active security platform that can reduce attack surface, detect zero-day and known threats, and mitigate security risks in cloud-native applications. In this webinar, we walk you through a real-world SaaS application showcasing how to evaluate a container security platform for the following: Container...
September 13, 2022
Observability for containers and Kubernetes: How to leverage it for security
Americas
10:00 am 11:00 am PDT
Traditional monitoring tools have fallen behind in a new world where applications are built using microservices and Kubernetes. How do you observe your Kubernetes nodes, pods and application activity across deployments without spending additional time to build frameworks and logic for context and correlation? More importantly, with the given information...
August 30, 2022
How to prevent a security breach in Kubernetes using runtime threat defense
Americas
10:00 am 11:00 am PDT
Prevention is better than remediation. Organizations strive to innovate, build and deliver cutting-edge applications for consumers to make life easier, faster and safer. In a microservice-based application, there are many services that communicate with each other to retrieve information and present it to the end user, including some that need...
August 16, 2022
Microsegmentation for Containers and Microservices: Best Practices
Americas
10:00 am 11:00 am PDT
There is a reason why traditional network-based segmentation solutions will not work in cloud-native environments – they are not built for it! A Kubernetes-native approach is required to isolate containzerized workloads within a deployment. Since Kubernetes is an open system with underlying dynamic infrastructure and no built-in mechanisms to prevent...
August 9, 2022
Container security basics (part 3) – Mitigate security risks during build and runtime stages
Americas
10:00 am 11:00 am PDT
Most container security tools provide scanning capabilities to find vulnerabilities but don’t focus on the critical step of mitigating the risk of security threats that can exploit these vulnerabilities. In this final webinar on container security basics, we take a look at topics below to mitigate the risks of exploitation...
August 2, 2022
Five things to consider in a security solution for containerized workloads
Americas
10:00 am 11:00 am PDT
As organizations transition from monolithic services in traditional data centers to microservices architecture in a public cloud, security becomes a bottleneck and causes delays in achieving business goals. Traditional security paradigms based on perimeter-driven firewalls do not scale for containerized workload. In this webinar, you will learn about five essential...
July 26, 2022
How to secure traffic leaving your Kubernetes Cluster with Zero-trust Workload Access Controls?
Americas
10:00 am 11:00 am PDT
Kubernetes workloads are dynamic, distributed, and ephemeral and do not have fixed network addresses. Traditional methods such as network firewalls, which rely on fixed network addresses, are insufficient to specify access controls at a granular pod level. Calico provides granular zero-trust workload access controls to control the flow of data...
July 19, 2022
Container security basics (part 2) – Using Calico for vulnerability management
Americas
10:00 am 11:00 am PDT
In this container security series, you will further learn how Calico Cloud’s image assurance capabilities reduce the attack surface by identifying vulnerabilities and misconfigurations and automatically blocking the use of vulnerable images with an admission controller. In addition, we will review how to specify exceptions to allow the use of...