San Francisco, CA, USA
Oct 20, 2020   |  By Vicente Herrera García
In this blog, we will cover the various requirements you need to meet to achieve NIST 800-53 compliance, as well as how Sysdig Secure can help you continuously validate NIST 800-53 requirements for containers and Kubernetes.
Oct 16, 2020   |  By Kaizhe Huang
While auditing the Kubernetes source code, I recently discovered an issue (CVE-2020-8563) in Kubernetes that may cause sensitive data leakage. You would be affected by CVE-2020-8563 if you created a Kubernetes cluster over vSphere, and enabled vSphere as a cloud provider with logging level set to 4 or above. In that case, your vSphere user credentials will be leaked in the cloud-controller-manager‘s log.
Oct 15, 2020   |  By Víctor Jiménez Cerrada
In this article, you will learn how to monitor kube-proxy to ensure the correct health of your cluster network. Kube-proxy is one of the main components of the Kubernetes control plane, the brains of your cluster. One of the advantages of Kubernetes is that you don’t worry about your networking or how pods physically interconnect with one another. Kube-proxy is the component that does this work.
Oct 13, 2020   |  By Dan Papandrea
As Kubernetes is eating the world, discover an alternative certified Kubernetes offering called K3s, made by the wizards at Rancher. K3s is gaining a lot of interest in the community for its easy deployment, low footprint binary, and its ability to be used for specific use cases that the full Kubernetes may be too advanced for. K3s is a fully CNCF (Cloud Native Computing Foundation) certified Kubernetes offering.
Oct 6, 2020   |  By Vicente Herrera García
In this article, you will learn how to add inline image scanning to a Google Cloud Build pipeline using the Sysdig Secure DevOps platform. We will show you how to create a basic workflow to build your container image, scan the image, and push it to a registry. We will also customize scanning policies to stop the build if a high-risk vulnerability is detected.
Sep 29, 2020   |  By Sysdig
Sysdig also adds threat detection using AWS CloudTrail with open source Falco.
Sep 29, 2020   |  By Vicente Herrera García
Discover how to automate AWS Fargate image scanning directly in your AWS environment and block vulnerabilities from reaching production, among other threats. AWS Fargate and ECS allow you to deploy containerized workloads quickly. Fargate is even more convenient, as you don’t have to take care of the infrastructure.
Sep 29, 2020   |  By Vicente Herrera García
Implementing AWS threat detection with Sysdig Secure takes just a few minutes. Discover how to improve the security of your cloud infrastructure using AWS CloudTrail and Sysdig Cloud Connector. With the rise of microservices and DevOps practices, a new level of dangerous actors threatens the cloud environment that governs all of your infrastructure. A malicious or inattentive cloud API request could have a sizable impact on availability, performance, and last but not least, billing.
Sep 25, 2020   |  By David Lorite Solanas
In this article, we are going to deploy and monitor Istio over a Kubernetes cluster. Istio is a service mesh platform that offers advanced routing, balancing, security, and high availability features, plus Prometheus-style metrics for your services out-of-the-box.
Sep 22, 2020   |  By Aaron Newcomb
The following Prometheus exporters best practices will help you implement a monitoring solution based on Prometheus, and will also increase your productivity. Prometheus is one of the foundations of the cloud-native environment. It has become the de-facto standard for visibility in Kubernetes environments, creating a new category called Prometheus monitoring.
Oct 19, 2020   |  By Sysdig
Sysdig can help you quickly move container apps into production without sacrificing visibility and security. With embedded security, monitoring and compliance, Sysdig gets teams shipping cloud apps faster, without slowing down developers.
Oct 13, 2020   |  By Sysdig
With the release of Kubernetes 1.18, we saw 40 features and updates added. In a recent blog post we collated these together in one place so that you can learn what may affect your clusters and prepare for change. Now, we go one step further, inviting Alex Ellis, CNCF Ambassador and Open Source project founder to share his take on the changes. We saw Alex’s in-depth article on the recent deprecations around “kubectl run” and asked him to pick four of his highlights to share with examples.
Oct 2, 2020   |  By Sysdig
The distributed nature of Kubernetes has turned both legacy infrastructure and traditional cybersecurity approaches on their heads. Organizations building cloud-native environments in their own data centers grapple with operationalizing and scaling Kubernetes clusters, and then ensuring system-wide security from the infrastructure layer all the way up to each container. In this webinar, you’ll hear from two cloud-native experts in infrastructure and security who will offer up valuable insights on.
Oct 2, 2020   |  By Sysdig
Protect Kubernetes? As Kubernetes matures, security is becoming an important concern for both developers and operators. In this talk, Loris Degioanni (CTO and Founder @Sysdig) will give an overview of cloud native security, discuss its different aspects, with particular focus on runtime, and explain what inspired the development of Falco, the CNCF container security project. Through demonstration, he will educate the CNCF community on the ways Falco is being used for real-world workloads. Lastly, he will share the latest on Falco’s adoption, maturation within CNCF and what’s on the horizon.
Sep 29, 2020   |  By Sysdig
Developers, operations, and security teams must work together to address key workflows to secure and monitor containers, Kubernetes and cloud services across the entire cloud-native lifecycle. By addressing mage scanning, runtime security, and compliance, along with monitoring for Kubernetes, container, applications, and cloud services you can automate protection and performance management to accelerate cloud adoption.
Sep 29, 2020   |  By Sysdig
Discover how to scan AWS Fargate containers in under 4 minutes with Sysdig Secure. Sometimes the handoff between your developers and security teams can be tough, especially when you deploy on serverless environments like Fargate, where a lot of the management of the underlying ECS, EKS infrastructure is abstracted from the teams.
Jul 27, 2020   |  By Sysdig
As you move to the cloud, your focus is on developing and deploying your applications. You may leave some functions for later, thinking they will slow you down. So when challenges appear your team feels unprepared. You need tools that are built for containers and Kubernetes, like the Sysdig Secure DevOps Platform. So your team can build visibility and security together in a secure DevOps workflow, and ship applications faster.
Jul 27, 2020   |  By Sysdig
Today, we are excited to announce a faster onboarding for Kubernetes visibility and security. With the SaaS-first approach and new enhancements to the Sysdig Secure DevOps Platform, you can get results after just a five-minute setup. This release includes a new guided onboarding process, out-of-the-box dashboards as part of curated essential workflows, and a new Sysdig Essentials tier.
Jun 16, 2020   |  By Sysdig
See how to connect the Sysdig Secure DevOps Platform with IBM Cloud Pak for Multicloud Management for OpenShift, Kubernetes, and container security and compliance.
Feb 22, 2019   |  By Sysdig
Prometheus metrics add a valuable dimension to cloud-native monitoring giving developers visibility into applications in highly dynamic service-oriented architectures. Sysdig automatically collects Prometheus metrics and helps it scale for the enterprise.
Oct 3, 2018   |  By Sysdig
For Dummies Series - Best practices, insights and recommendations.
Oct 1, 2018   |  By Sysdig
Microservices built on containers and Kubernetes are helping you build and run software applications much faster than ever before. In your new infrastructure stack, keeping track of what’s happening becomes a new challenge.
Sep 1, 2018   |  By Sysdig
How to Monitor Kubernetes services, cluster and components.
Aug 1, 2018   |  By Sysdig
Scale, secure and augment Prometheus.
Jul 1, 2018   |  By Sysdig
An inside look at shifting container usage trends.
Jun 1, 2018   |  By Sysdig
What you need to think about when deploying Kubernetes.
May 1, 2018   |  By Sysdig
How containers change your compliance lifecycle.
Apr 1, 2018   |  By Sysdig
Get your containerized apps production-ready.
Mar 1, 2018   |  By Sysdig
A unified approach for security, monitoring, and forensics in containerized and microservice environments.

Sysdig is the first unified approach to monitor and secure containers across the entire software lifecycle.

Sysdig was born out of the belief that open source tools will be at the foundation of your next generation infrastructure. See our projects for system visibility, and container security, as well as partner projects we’ve embraced.

Accelerate your transition to containers, and then have confidence in your ongoing operations. We've built the cloud-native intelligence platform to create a single, more effective way to secure, monitor, and assure your critical applications:

  • Container security (Sysdig Secure): Protect and assure your applications. Bring together image scanning and run-time protection to identify vulnerabilities, block threats, enforce compliance, and audit activity across your microservices.
  • Enterprise-grade Docker monitoring (Sysdig Monitor): Enhance software reliability and accelerate problem resolution with advanced Kubernetes integration and built-in Prometheus monitoring capabilities.
  • Automatic orchestrator integration (Sysdig ServiceVision): We use Sysdig ServiceVision to dynamically map services using metadata from Kubernetes, OpenShift, AWS, Azure, Google, Mesos, or Docker EE, and more. With this insight, you can isolate and solve problems faster.

Our container intelligence platform monitors and secures millions of containers across hundreds of enterprises, including Fortune 500 companies and web-scale properties.