Detect Container Security Threats

Looking to use open source tools to prepare, detect and respond to security threats in containers and Kubernetes? Wondering how you can create perimeters in the cloud?

Join this 30 minute session of practical learnings about open source threat detection and an update of security announcements from AWS re:Invent.

You’ll walk away with new learnings and an e-copy of the new O’Reilly book, Practical Cloud Native Security with Falco.

Detect Container Security Threats

Thank you!

We’ve received your submission and will be in touch soon.

Trusted globally
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.

Prioritize and stop the threats that matter most.

When attackers move at cloud speed, every second counts. From prevention to defense, Sysdig is purpose-built and proven for the scale, speed, and complexity of the cloud.