Sponsor: Trend Micro

Security by Design: Kubernetes or Docker

Join Trend Micro’s Principal Engineer and Cloud Advisor, Jason Dablow, as he takes you through art of building better applications that meet the speed and demands of your business—driving a successful DevOps practice.

In this session, you will learn how to help protect your containerized applications earlier in the process by arming your developers inside your CI/CD pipeline, regardless of the current orchestration tooling, platform, or infrastructure. Integrated security that doesn’t need to slow you down.

That’s a thing of beauty.

View Now

Security by Design: Full Life Cycle Container Security

In this webinar we outline the key steps and tools that will help you artfully automate full life cycle container security, including useful APIs, image scanning and runtime protection to detect problems early and mitigate against attacks targeting your host, Docker®, and Kubernetes® platforms and containers.

Watch a demonstration on how to quickly deploy Trend Micro™ Deep Security™ Smart Check into your software delivery pipeline and how it makes it easy to scan your images using the Deep Security Smart Check plugin for Jenkins®.

Integrated security that doesn’t need to slow you down.

That’s a thing of beauty.

View Now

DZone AppSec Trend Micro Report

To meet new market opportunities, as well as competitive and regulatory requirements, the software development life cycle has gone through several changes. DevOps methodologies are being adopted to develop and deploy applications at a faster, more sustainable rate. Read this paper to see why we predict:

  • The role of application developers in the fight against vulnerabilities will continue to gain visibility.
  • Source code analysis is growing as an AppSec testing technique.
  • Regulatory requirements will be the main factor shaping AppSec policy over the next 12 months.

View Now

Six Steps to Container Security

An application or service that you develop once to run in multiple clouds has a clear advantage over one that is bound to a single OS or runtime environment. Container technology makes it possible, but container security vulnerabilities are beginning to surface. We describe 6 steps you can take to ensure that container security doesn’t become a DevOps roadblock.

Get Whitepaper

Addressing Challenges in Hybrid Cloud Security

How can you secure your apps and services without compromising your schedule? (Hint: It’s all in the automation.) Enterprises are using hybrid cloud technologies to enrich the user experience and power their digital transformation. But running applications in public clouds while managing the application data in private clouds makes for a unique set of security requirements. We discuss the challenges that DevOps teams face in hybrid environments and how those challenges can be overcome.

Get Whitepaper

EGS White Paper Trend Micro April 2018

You’re using an array of platform- and infrastructure-as-a-service (IaaS) cloud services to build and deliver new applications and services into today’s hotly competitive market. And it’s your CI/CD pipeline that enables the speed you need to succeed – but your cybersecurity regime must keep pace. We discuss how to apply the DevOps principals to codify and improve your cybersecurity practices and controls.

Get Whitepaper

Security by Design: Full Life Cycle Container Security

In this webinar we outline the key steps and tools that will help you artfully automate full life cycle container security, including useful APIs, image scanning and runtime protection to detect problems early and mitigate against attacks targeting your host, Docker®, and Kubernetes® platforms and containers.

Watch a demonstration on how to quickly deploy Trend Micro™ Deep Security™ Smart Check into your software delivery pipeline and how it makes it easy to scan your images using the Deep Security Smart Check plugin for Jenkins®.

Integrated security that doesn’t need to slow you down.

That’s a thing of beauty.

View Now

Security by Design: Kubernetes or Docker

Join Trend Micro’s Principal Engineer and Cloud Advisor, Jason Dablow, as he takes you through art of building better applications that meet the speed and demands of your business—driving a successful DevOps practice.

In this session, you will learn how to help protect your containerized applications earlier in the process by arming your developers inside your CI/CD pipeline, regardless of the current orchestration tooling, platform, or infrastructure. Integrated security that doesn’t need to slow you down.

That’s a thing of beauty.

View Now

DZone AppSec Trend Micro Report

To meet new market opportunities, as well as competitive and regulatory requirements, the software development life cycle has gone through several changes. DevOps methodologies are being adopted to develop and deploy applications at a faster, more sustainable rate. Read this paper to see why we predict:

  • The role of application developers in the fight against vulnerabilities will continue to gain visibility.
  • Source code analysis is growing as an AppSec testing technique.
  • Regulatory requirements will be the main factor shaping AppSec policy over the next 12 months.

View Now

Six Steps to Container Security

An application or service that you develop once to run in multiple clouds has a clear advantage over one that is bound to a single OS or runtime environment. Container technology makes it possible, but container security vulnerabilities are beginning to surface. We describe 6 steps you can take to ensure that container security doesn’t become a DevOps roadblock.

Get Whitepaper

Addressing Challenges in Hybrid Cloud Security

How can you secure your apps and services without compromising your schedule? (Hint: It’s all in the automation.) Enterprises are using hybrid cloud technologies to enrich the user experience and power their digital transformation. But running applications in public clouds while managing the application data in private clouds makes for a unique set of security requirements. We discuss the challenges that DevOps teams face in hybrid environments and how those challenges can be overcome.

Get Whitepaper

EGS White Paper Trend Micro April 2018

You’re using an array of platform- and infrastructure-as-a-service (IaaS) cloud services to build and deliver new applications and services into today’s hotly competitive market. And it’s your CI/CD pipeline that enables the speed you need to succeed – but your cybersecurity regime must keep pace. We discuss how to apply the DevOps principals to codify and improve your cybersecurity practices and controls.

Get Whitepaper

AppSec Trend Report

To meet new market opportunities, as well as competitive and regulatory requirements, the software development life cycle has gone through several changes. DevOps methodologies are being adopted to develop and deploy applications at a faster, more sustainable rate. Read this paper to see why we predict:

  • The role of application developers in the fight against vulnerabilities will continue to gain visibility.
  • Source code analysis is growing as an AppSec testing technique.
  • Regulatory requirements will be the main factor shaping AppSec policy over the next 12 months.

View Now

Six Steps to Container Security

An application or service that you develop once to run in multiple clouds has a clear advantage over one that is bound to a single OS or runtime environment. Container technology makes it possible, but container security vulnerabilities are beginning to surface. We describe 6 steps you can take to ensure that container security doesn’t become a DevOps roadblock.

Get Whitepaper

Addressing Challenges in Hybrid Cloud Security

How can you secure your apps and services without compromising your schedule? (Hint: It’s all in the automation.) Enterprises are using hybrid cloud technologies to enrich the user experience and power their digital transformation. But running applications in public clouds while managing the application data in private clouds makes for a unique set of security requirements. We discuss the challenges that DevOps teams face in hybrid environments and how those challenges can be overcome.

Get Whitepaper