Sysdig Announces Sysdig Secure 2.0
June 14, 2018

Sysdig introduced Sysdig Secure 2.0, a way for enterprises to secure containers and microservices.

The latest version adds vulnerability management, more than two hundred compliance checks, and security analytics. The Sysdig Cloud-Native Intelligence Platform is the only technology to offer unified security, monitoring, and forensics for containers and microservices, giving users a robust view of the health and risk profiles of their cloud-native applications.

Sysdig Secure’s vulnerability management capabilities help organizations bring application security, compliance, and quality closer to the developer. Sysdig Secure ensures that as companies scale, their security scales at the same rate, allowing DevOps to deploy knowing all images and containers are vulnerability free, the microservices are in compliance, and they can defend their applications from compromise.

Vulnerability Management:

- Static image scanning – Sysdig Secure 2.0 can parse container images and identify vulnerable packages, libraries, and configurations before a deployment, ultimately enabling a more secure environment and driving consistent processes across development teams.

- CI/CD integrations – Sysdig Secure 2.0 adds a native Jenkins plugin, which adds a Sysdig Secure step to the CI pipeline and enables companies to automate container image scanning. With each fail build, the system automatically evaluates the image against policy and forces compliance before an image progresses in the pipeline.

- Quarantine or kill vulnerable images – Sysdig Secure 2.0 can take actions like killing or quarantining a container if vulnerabilities or exposed credentials are found, reducing the risk of a security breach.

- Runtime vulnerability management and scanning – Sysdig Secure 2.0 manages, tracks, and updates vulnerability data for containers in production. Sysdig Secure 2.0 also enriches it with Kubernetes metadata to provide context when fixing vulnerabilities across distributed applications.

Compliance:

- Sysdig Secure 2.0 eases the pain of measuring and enforcing compliance across a distributed environment through compliance controls, audit checks, policies, and results.
- Sysdig automatically scans the infrastructure with requirements based on Center for Internet Security (CIS) configurations and hardening benchmarks. Sysdig allows users to scope and schedule Docker and Kubernetes benchmarks to measure and maintain compliance.

Security Analytics:

Effective container runtime security hinges on security response teams being able to quickly detect, analyze, and respond to security threats on live containers – from detection, to remediation, to forensics. Sysdig Secure 2.0 provides rich metrics about events, compliance, and vulnerabilities over time, enabling deeper analytics and a better understanding of the environment. Security metrics tied back to containers, images, hosts, and Kubernetes entities enable users to easily determine how different organizations, applications, and services are trending in the security posture.

“Due to the newness of containers and the dynamic environment, container security for cloud-native applications poses several new challenges,” said Loris Degioanni, CTO and founder, Sysdig. “Sysdig Secure 2.0 ensures that developers, operations, and risk professionals have a single source of intelligence to monitor and secure their applications.”

Sysdig Secure is available as a standalone technology or as a part of the unified Sysdig Cloud-Native Intelligence Platform, which includes Sysdig Monitor. Sysdig Secure 2.0 is currently available as a private beta.

The Latest

June 21, 2018

DevSecOps is quickly gaining support and traction, within and beyond information security teams. In fact, 70% of respondents believe their culture can embrace the change needed to fuse Security and DevOps, according to a new survey of 80 security professionals by Aqua Security ...

June 20, 2018

The larger the company size, the higher the proportion of low IT performers, according to the State of DevOps: Market Segmentation Report from Puppet, based on the 2017 State of DevOps Survey data ...

June 18, 2018

An overwhelming 83 percent of respondents have concerns about deploying traditional firewalls in the cloud, according to Firewalls and the Cloud, a survey conducted by Barracuda Networks...

June 14, 2018

Despite the vast majority of cloud management decision-makers believing that DevOps and microservice enablement are important, very few believe that their organizations are capable of delivering them today — a gap that is costing the average enterprise $34 million per year, according to new report from the Ponemon Institute ...

June 12, 2018

Dev teams are doing their best to give the customers what they want, but oftentimes find themselves in between a rock and a hard place. Teams are struggling to get up to speed with new tools that are meant to make their lives easier and more realistic to hit deadlines. With spring cleaning season upon us, take time this season to tune up agile processes and continue the work of advancing the shift towards DevOps ...

June 11, 2018

The ability to create a culture of DevOps is critical to any organization's ability to deliver applications and services at a high rate of speed, but can we clearly and concisely answer the question: What exactly is DevOps? Despite the best intentions, some large companies are struggling to understand what DevOps actually is, and what it takes to fully implement its concepts and reap its benefits ...

June 07, 2018

The Twelve-Factor App is a methodology that offers a 12-step best practice approach for developers to apply when building software-as-a-service apps that are both scalable and maintainable in a DevOps world. As software continues to be written and deployed at a faster rate and in the cloud, development teams are finding there is more room for failure and vulnerabilities. This blog series will discuss how to build a Twelve-Factor app securely ...

June 05, 2018

Everyone understands the importance of code quality for applications, particularly when DevOps results in releases becoming faster and faster, reducing the room for error. The same issues increasingly apply to databases, which are a vital part of DevOps workflows. Fail to integrate the database into DevOps and you'll face bottlenecks that slow down your processes and undermine your efforts ...

June 04, 2018

DevOps and security traditionally have been siloed functions and security is often seen as a policing function by DevOps team members. However, more mature business leaders are trying to bridge the gap between the two functions to achieve business excellence. This theme was evident from our recent survey where 39% of respondents cited that DevOps and development teams care greatly about their cybersecurity posture, showing that the silo between security/IT and development teams is diminishing ...

May 31, 2018

DEVOPSdigest asked experts from across the IT industry for their opinions on the top tools to support DevSecOps. Part 5, the last installment, offers some final thoughts about "tools" that are not necessarily technology ...

Share this