Vulnerability Management with Sysdig
Software is always changing and improving, and within this process, developers can unknowingly introduce vulnerabilities.
Discover how Sysdig Secure provides a single vulnerability management solution for both containers and hosts.
It allows you to validate compliance across your whole infrastructure.
And it's so easy to deploy, that you will be scanning images and hosts in seconds.
If you want to learn more:
[Blog] Check these vulnerability assessment and management best practices:
https://sysdig.com/blog/vulnerability-assessment/
[Webinar] Less is more: Scan containers and hosts in one workflow:
https://sysdig.com/resources/webinars/less-is-more-scan-containers-and-hosts-in-one-workflow/
[Blog] Shielding your Kubernetes runtime with image scanning on admission controller:
https://sysdig.com/blog/image-scanning-admission-controller/
[Blog] 12 Container image scanning best practices to adopt in production:
https://sysdig.com/blog/image-scanning-best-practices/
[Blog] Top 20 Dockerfile best practices:
https://sysdig.com/blog/dockerfile-best-practices/
Or check our product page:
https://sysdig.com/products/secure/image-scanning/
Or request a free trial of the Sysdig Secure DevOps Platform:
https://sysdig.com/company/free-trial-secure/
00:00 Why vulnerability management is important?
00:30 Consolidating container and host scanning
00:50 Demo: Runtime image scanning
01:17 Demo: Registry image scanning
01:27 Demo: Host scanning
01:55 Demo: Vulnerability reports
02:22 Demo: Vulnerability alerts
02:56 Demo: Image scanning policies for CI/CD pipelines
03:25 Demo: Image scanning on admission controller
03:38 Conclusion
MB019LWJRYJPZNM