See how to easily isolate and secure application and service data without resorting to isolated infrastructure. Provide explicit user access to containers, namespaces, services, hosts and more.
Overview of how Sysdig Monitor provides deep container metrics, rich Kubernetes & Docker monitoring, and enterprise-grade Prometheus monitoring for enterprise-class application visibility, alerting, and troubleshooting.
An example of how we can audit and detect anomalous activity in a microservices application running in Docker and Kubernetes using container runtime security.
This is how we can perform forensics and postmortem analysis after someone hacking into our container and downloading some malware. In this case was a Wordpress instance running on Docker in Kubernetes.
A traditional security policy model doesn’t work with containers. The hard part is applying those policies to different containers as they change in your infrastructure. We need a security policy model that can adapt dynamically to orchestration platforms like Kubernetes and Cloud Native apps.
Auditing and logging automatically any command execution being run across your distributed environment is a must for container security best practices.
Watch this overview of Sysdig Monitor for an in depth look at how to monitor Docker containers, Prometheus metrics and more. Sysdig ContainerVision sees inside containers from the outside and ServiceVision enriches container metrics with service-oriented metadata from Kubernetes, OpenShift, Docker Swarm, and Mesos - DC/OS.