Alcide Webinars

On-demand Webinars

microsoft webinar
September 19, 2019

AKS Hygiene Checks from Your CI+CD Pipeline with K8s Advisor

Integrating automated AKS security checks into your pipeline can ease the DevOps life a great deal. Learn how to implement, in only 5 minutes, the Alcide Kubernetes Advisor, a DevOps security tool that integrates into your Azure DevOps pipeline and works for you.

Source Code to K8s Configuration Securityi
September 18, 2019

360° Kubernetes Security: From Source Code to K8s Configuration Security

Kubernetes has become the default way for many organizations to scale and orchestrate their use of containers. However, organizations are starting to find themselves needing to take the necessary steps to protect their containers. Automating security checks throughout the development life cycle can help reduce risk and allow organizations to develop and deploy securely.

resource page-landing page – Continuous Kubernetes Security Integration
June 12, 2019

Alcide-Codefresh: Providing Continuous Kubernetes Security Through Your CI/CD Pipeline

buz page-Using Istio to Securely Monitor Your Service
May 15, 2019

Kubernetes Cluster Hygiene – Security Best Practices for Kubernetes

Screen Shot 2019-04-18 at 15.25.37
May 2, 2019

Kubernetes: Automating and Securing Production Clusters with Zero Ops

In this webinar, we will explore and discuss everything related to managing and securing Kubernetes clusters. We will introduce a new approach to deploy Serverless Containers in a "Nodeless" cluster and discuss some of the best practices in identifying cluster resource weaknesses and misconfigurations and how to avoid them.

buz page-Istio and Kubernetes Security
April 3, 2019

Kubernetes and Istio Security

What are the basic security features that Istio provides
How to manage and restrict traffic to external services with Kubernetes network policy and Istio network policy
How to spot security anomalies
Interesting use cases

buz page-Kubernetes Network Security – Going Beyond Network Policies

Kubernetes Network Security- Going Beyond Network Policies

Explore Kubernetes network policies, workload segmentation, and what it can and can't provide. We will dive in to how Kubernetes service discovery can be used to bypass network policies.

landing page-Using Istio to Securely Monitor Your Services copy (1)
April 16, 2019

Webinar with Giant Swarm: Using Istio to Securely Monitor Your Services

Our webinar will focus on how to gain a deeper understanding of using Istio for monitoring tasks while using Istio security features to secure your microservices and spot security anomalies.

CNCF

CNCF Webinar: Istio – Security of the mesh and security in the mesh

Stay updated

Subscribe to receive email updates