Containerization

Discover the latest collection of talks and videos on Containerization from industry experts.

Recent talks on Containerization

Alert Overload: Cutting Through Cloud Chaos to Find Real Threats
Channel Logo

Alert Overload: Cutting Through Cloud Chaos to Find Real Threats

Our cloud environments are buzzing with alerts—but how many of them actually matter? In a world where attackers move fast and alerts never stop, it’s
easy to miss the threats hiding in plain sight. This session delivered by Bruno Da Silva, Sysdig, dives into practical, no-nonsense ways to filter out the noise
and focus on the risks that really need your attention. We’ll break down how in-use compliance data, risk prioritization, and Attack Path Analysis (APA) can h…

How to overcome cloud-native challenges in your digital transformation journey
Channel Logo

How to overcome cloud-native challenges in your digital transformation journey

Cloud-native architectures continue to serve as a go-to enabler for digital transformation projects. In fact, recent findings from TechTarget and Enterprise
Strategy Group revealed that investing in hybrid cloud, multicloud, and off-premises cloud computing infrastructure are the top 3 compute infrastructure
investments for organizations next year. However, many businesses are still running into challenges as they get started or scale their cloud native infrastru…

Understanding Container Security: Common Misconfigurations
Channel Logo

Understanding Container Security: Common Misconfigurations

Containerized applications and microservices simplify scaling and deployment. Yet, they also create new opportunities for attackers to exploit.
Misconfigurations in these environments can allow attackers to hide, move, and launch advanced attacks. Join us for a deep dive into common container
misconfigurations. We'll dive into Black Duck’s extensive experience in container penetration testing. What you’ll learn: • Common misconfigurations f…

18% of Secrets Stay Exposed—Are Yours at Risk?
Channel Logo

18% of Secrets Stay Exposed—Are Yours at Risk?

Secrets hidden in your code don't always stay hidden. Aqua Nautilus research uncovered a major blind spot: nearly 18% of secrets remain exposed—even
after DevSecOps teams believe they've been removed. Cached secrets, mirrored repositories, and gaps in conventional scanning tools create phantom
vulnerabilities that attackers can exploit, sometimes years after a secret was ‘deleted.’ In this eye-opening webinar, Aqua Nautilus will reveal: • Why traditi…

Simplify, Secure, and Scale: Running Enterprise Workloads on Containers
Channel Logo

Simplify, Secure, and Scale: Running Enterprise Workloads on Containers

Learn how SUSE and Portworx by Pure Storage are simplifying containerization and data management for modern enterprises. Running enterprise
workloads on containers doesn’t have to be complex. SUSE and Portworx by Pure Storage have joined forces to deliver a comprehensive approach to
containerization and data management that ensures security, scalability, and simplicity. Join this webinar to discover: Proven practices for managing Kuber…

SiteMinder Containerization: Optimizing value from your web access management solution
Channel Logo

SiteMinder Containerization: Optimizing value from your web access management solution

“IT expands at such a rapid pace today that holding onto traditional on-premises solutions is like keeping a vintage car—nostalgic, yes, but it's probably not
the most efficient way to get from point A to point B,” according to Sesh Ramasharma, who is the Global Head of Identity Security with the digital foundation
consulting team at HCLTech. If you're using Broadcom's SiteMinder for web access management, you know how solid and reliable it can be. As your enterp…

Container Security Essentials
Channel Logo

Container Security Essentials

As the popularity of cloud-native applications continues to surge, containers are becoming the preferred option to package and deploy these applications
because of the agility and scalability they deliver. According to Gartner, “by 2022, more than 90% of global organizations will be running containerized
applications in production by 2026 or 2027,up from less than 40% in 2021.” The popularity of containers has also attracted the attention of hackers who ar…

Container attack surface explained: strategies for securely-designed deployments
Channel Logo

Container attack surface explained: strategies for securely-designed deployments

Have you noticed how open-source software has become essential to innovation in the cloud-native arena? Countless cloud-native applications are powered
by open source, and they are often mission-critical for organizations across industries, ranging from small startups to large enterprises. However, there are
inherent security risks associated with this reliance on external components, and this problem is only growing as container adoption continues to gain mom…

Coming up next

VMs on K8s: making your KubeVirt migration happen
Channel Logo

VMs on K8s: making your KubeVirt migration happen

Many organizations have placed their bets on Kubernetes and cloud native as the future for their application infrastructure — and not just for containers, but
traditional VMs, too. In this webinar, we'll explore the strategies and best practices you’ll need to bring your VMs to K8s, drawn from real experiences helping
enterprises migrate to KubeVirt in production. You'll learn: * What's new with KubeVirt, what it's good at — and where there are still gaps * How to speed up…

Choosing a Kubernetes management platform: the analyst perspective
Channel Logo

Choosing a Kubernetes management platform: the analyst perspective

Kubernetes is everywhere in today’s enterprise; data centers, clouds, the edge. But how do you manage it all? A whole class of product called enterprise
Kubernetes management platform has emerged to fill this need. In this webinar we’ll be joined by tech analysts GigaOm to explore the state of the art in K8s
management platforms for edge to cloud, drawing on insights from two recent 2025 Radar Reports. You'll learn the required capabilities and criteria that y…

From Legacy to Cloud-Native: Virtualization Strategies for Financial Institutions
Channel Logo

From Legacy to Cloud-Native: Virtualization Strategies for Financial Institutions

As financial institutions modernize their IT infrastructure, traditional virtualization solutions often impose high costs, operational complexity, and vendor
lock-in. Cloud-native virtualization offers a scalable, cost-efficient alternative that enhances agility, security, and compliance—critical factors for financial
services innovation. In this webinar, we’ll explore a real-world use case of cloud-native virtualization in the financial sector. Our speaker, Michael Tillman, S…

Your one-stop shop for edge Kubernetes
Channel Logo

Your one-stop shop for edge Kubernetes

Edge computing environments present unique challenges for running Kubernetes clusters. In this webinar, we'll show you how you can solve them all with
Spectro Cloud's Palette Edge platform. We'll run through the lifecycle of an edge project, exploring how you can: * Build optimized software stacks with your
choice of integrations, from OS to app * Provision devices to hundreds or thousands of sites, without burning your field engineering budget * Secure against…

AI on Kubernetes: Scaling Smarter, Running Faster with k0rdent
Channel Logo

AI on Kubernetes: Scaling Smarter, Running Faster with k0rdent

Deploying AI on Kubernetes can be complex, involving GPU provisioning, model serving, and cost-efficient scaling. This session explores how to streamline AI
deployments on Kubernetes using k0rdent. Attendees will learn how to automate GPU ready cluster provisioning, deploy scalable AI models with Kserve, and
optimize inference workloads with Knative and Istio. With GPUs being constrained and costly, this session emphasizes how auto-scaling can maximize resou…

Managing Kubernetes in regulated environments: Palette VerteX
Channel Logo

Managing Kubernetes in regulated environments: Palette VerteX

"Public sector, defense, healthcare, financial services... many different industries set high standards for infrastructure security, privacy and governance, and
these standards have huge implications for your Kubernetes environments. In this webinar we'll take a tour of Spectro Cloud's Palette VerteX, a Kubernetes
management platform designed specifically to meet security requirements in DoD and regulated industries. We'll spotlight features such as: * Support for a…

AWS Fargate: Serverless Container Security Simplified
Channel Logo

AWS Fargate: Serverless Container Security Simplified

As organizations accelerate their cloud-native journeys, AWS Fargate presents a compelling option for running containers without managing servers or
clusters. However, the convenience of Fargate comes with unique security considerations. With cybersecurity threats on the rise, securing your Fargate
deployments is not just an option—it's a necessity. In this Techstrong Learning Experience, experts from Aqua Security and AWS will explore the specific sec…

Protecting Kubernetes® Workloads on Google Cloud Platform
Channel Logo

Protecting Kubernetes® Workloads on Google Cloud Platform

Join Google Cloud and Palo Alto Networks for an educational overview of containers, Kubernetes and the tools available to help your organization securely
adopt these technologies. Then, see how they work firsthand in a hands-on lab featuring our joint offerings. During the session, you'll: - Use Google
Kubernetes Engine to deploy and manage containerized services. - Learn how to protect a GKE cluster and a GCE Host against vulnerabilities, compliance a…

Attend Summits on Containerization

Containers in the Enterprise

Containers in the Enterprise

Stay on top of containerization with leading orchestration products and best practices to secure and monitor your company's containers

|7 sessions
Cloud-Native Enterprise DevOps Summit

Cloud-Native Enterprise DevOps Summit

Uncover the benefits of a cloud-native, cloud-first DevOps approach in the enterprise. With the future of enterprise IT living within the cloud, high
performance software development and agile infrastructure is critical to competitiveness.As new tools and services for developers continue to flood the ma…

|10 sessions
Building a Secure Cloud Environment

Building a Secure Cloud Environment

Strengthen your cloud applications and infrastructure against threats with expert strategies and tools

|19 sessions
Cloud-Native Modernization

Cloud-Native Modernization

Build and run scalable applications seamlessly, harnessing cloud-native tools and processes to accelerate delivery, boost efficiency and drive innovation.

|9 sessions
Managing Hybrid and Multi-Cloud Environments

Managing Hybrid and Multi-Cloud Environments

Effectively managing complex hybrid and multi-cloud environments is crucial for today's organizations to make the best use of cloud and realize business
benefits.

|11 sessions
Next-Gen Strategies for Securing the Network in 2022

Next-Gen Strategies for Securing the Network in 2022

According to a 2021 study by the Ponemon Institute, 68% of organizations experienced one or more endpoint attacks that successfully compromised data
and/or IT infrastructure in the last 12 months. Coupled with the rise of zero trust meaning that endpoint security is becoming even more critical, it’s safe to …

|16 sessions

Watch series about Containerization

K8s Tech Talk: The Ultimate Guide to Cloud-Native and Kubernetes Security
7 episodes
Series Company Logo

K8s Tech Talk: The Ultimate Guide to Cloud-Native and Kubernetes Security

Whether you’re new to Kubernetes or a seasoned pro, this series offers invaluable insights and practical guidance for overcoming the challenges of
cloud-native security. Kubernetes and containers are the backbone of cloud-native security, providing the scalability and resilience needed to defend again…

Watch series

SolarWinds Observability Webcast Series
17 episodes
Series Company Logo

SolarWinds Observability Webcast Series

Managing hybrid ecosystems has never been more challenging. From gaining full visibility into complex infrastructures to ensuring peak performance—it’s
hard to keep everything running smoothly. Join us for this webinar series and explore SolarWinds® Observability, the first modern solution built for hybrid IT.…

Watch series

APJ Webcast Series
9 episodes
Series Company Logo

APJ Webcast Series

Our Easy-to-Use Products Scale with You as You Grow to Meet the Ever-Changing Needs of IT. We Design Products To Empower Technology Professionals To Do
Their Jobs More Effectively.

Watch series

Google Cloud: Power your business with modern cloud apps
5 episodes
Series Company Logo

Google Cloud: Power your business with modern cloud apps

Learn helpful strategies on how to leverage cloud apps that can transform your end users’ experiences. Join us for the “Power Your Business with Modern
Cloud Apps: Strategies and Best Practices” webinar where we’ll share helpful practices and demonstrate how Google Cloud services like GKE, Apigee API, A…

Watch series

Database Webcast Series
25 episodes
Series Company Logo

Database Webcast Series

Monitor, analyze, diagnose, and optimize database performance and data ops that drive your business-critical applications. Unify on-premises and cloud
database visibility, control, and management with streamlined monitoring, mapping, data lineage, data integration, and tuning across multiple vendors.

Watch series

Cloud Security Series
2 episodes
Series Company Logo

Cloud Security Series

Cloud computing has revolutionized how organizations store, process, and access applications and data, resulting in unparalleled flexibility and efficiency.
However, the rapid adoption of these cloud services has placed higher demands on security professionals to manage the associated risks and threats. Join …

Watch series