{"id":5423,"date":"2020-07-28T22:10:34","date_gmt":"2020-07-28T19:10:34","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog_he\/?p=5423"},"modified":"2021-05-25T14:27:42","modified_gmt":"2021-05-25T11:27:42","slug":"sysdig-secure-intro-video","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog_he\/sysdig-secure-intro-video\/","title":{"rendered":"\u05e1\u05e8\u05d8\u05d5\u05df \u05d4\u05d9\u05db\u05e8\u05d5\u05ea \u05e2\u05dd Sysdig Secure"},"content":{"rendered":"<p>\u05de\u05d5\u05d6\u05de\u05e0\u05d9\u05dd \u05dc\u05e6\u05e4\u05d5\u05ea \u05d1\u05e1\u05e8\u05d8\u05d5\u05df \u05e7\u05e6\u05e8\u05e6\u05e8 (\u05d3\u05e7\u05d4 \u05d5\u05d7\u05e6\u05d9) \u05e2\u05dc \u05e4\u05ea\u05e8\u05d5\u05df Sysdig Secure<br \/>\n\u05d4\u05e4\u05ea\u05e8\u05d5\u05df \u05de\u05d9\u05d5\u05e2\u05d3 \u05dc\u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d1- Cloud-native &#8211; \u05d2\u05dd \u05d1\u05e2\u05e0\u05df \u05d5\u05d2\u05dd \u05d1\u05e8\u05e9\u05ea\u05d5\u05ea \u05e1\u05d2\u05d5\u05e8\u05d5\u05ea<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/452897983\" width=\"700\" height=\"393.75\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>\u05dc\u05e0\u05d5\u05d7\u05d9\u05d5\u05ea\u05db\u05dd \u05ea\u05e8\u05d2\u05de\u05e0\u05d5 \u05d5\u05d4\u05d5\u05e1\u05e4\u05e0\u05d5 \u05db\u05ea\u05d5\u05d1\u05d9\u05d5\u05ea, \u05d5\u05ea\u05e7\u05e6\u05d9\u05e8.<\/p>\n<p><strong><em>\u05d0\u05e0\u05d5 \u05de\u05d9\u05d9\u05e6\u05d2\u05d9\u05dd \u05d0\u05ea \u05de\u05d5\u05e6\u05e8\u05d9 Sysdig \u05d1\u05d0\u05e8\u05e5, \u05d5\u05dc\u05e6\u05d3 \u05e8\u05e9\u05d9\u05d5\u05e0\u05d5\u05ea \u05d5\u05de\u05e6\u05d9\u05e2\u05d9\u05dd \u05d2\u05dd \u05d9\u05e2\u05d5\u05e5, \u05d4\u05d8\u05de\u05e2\u05d4 \u05d5\u05d4\u05d3\u05e8\u05db\u05d4.<br \/>\n<\/em><em>\u05e4\u05e0\u05d5 \u05d0\u05dc\u05d9\u05e0\u05d5 \u05dc\u05de\u05d9\u05d3\u05e2 \u05e0\u05d5\u05e1\u05e3: <a href=\"mailto:sysdig@almtoolbox.com\" target=\"_blank\" rel=\"noopener noreferrer\">sysdig@almtoolbox.com<\/a> \u05d0\u05d5 \u05d8\u05dc\u05e4\u05d5\u05e0\u05d9\u05ea 072-240-5222<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3>\u05ea\u05e7\u05e6\u05d9\u05e8 \u05e1\u05e8\u05d8\u05d5\u05df Sysdig Secure:<\/h3>\n<p>\u05d4\u05e7\u05e6\u05d1 \u05d4\u05de\u05d4\u05d9\u05e8 \u05e9\u05dc \u05d8\u05e8\u05e0\u05e1\u05e4\u05d5\u05e8\u05de\u05e6\u05d9\u05d4 \u05d3\u05d9\u05d2\u05d9\u05d8\u05dc\u05d9\u05ea<\/p>\n<p>\u05de\u05d0\u05d9\u05e5 \u05d0\u05ea \u05d4\u05de\u05e2\u05d1\u05e8 \u05dc\u05d9\u05e9\u05d5\u05de\u05d9 Cloud-native\u00a0\u05d1\u05d0\u05de\u05e6\u05e2\u05d5\u05ea containers \u05d5- Kubernetes \u05e2&quot;\u05de \u05dc\u05d4\u05d0\u05d9\u05e5 \u05d0\u05ea \u05e7\u05e6\u05d1 \u05d4- delivery<\/p>\n<p>\u05d0\u05d1\u05dc delivery \u05d6\u05d4 \u05e2\u05e0\u05d9\u05d9\u05df \u05d0\u05d7\u05d3 &#8212;\u00a0\u05d6\u05de\u05d9\u05e0\u05d5\u05ea \u05d4\u05d0\u05e4\u05dc\u05d9\u05e7\u05e6\u05d9\u05d4, \u05d1\u05d9\u05e6\u05d5\u05e2\u05d9\u05dd \u05d5\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc\u05d9\u05d4 \u05d4\u05dd \u05d3\u05d1\u05e8 \u05d0\u05d7\u05e8!<\/p>\n<p>\u05dc\u05e6\u05d5\u05d5\u05ea\u05d9\u05dd \u05e9\u05d0\u05d7\u05e8\u05d0\u05d9\u05dd \u05e2\u05dc \u05e1\u05d1\u05d9\u05d1\u05d5\u05ea production, \u05e2\u05d5\u05d1\u05d3\u05d4 \u05d0\u05d7\u05ea \u05db\u05d1\u05e8 \u05d1\u05e8\u05d5\u05e8\u05d4:<\/p>\n<p>\u05e0\u05d9\u05d8\u05d5\u05e8 \u05d5\u05e4\u05ea\u05e8\u05d5\u05df \u05ea\u05e7\u05dc\u05d5\u05ea \u05d4\u05dd \u05e8\u05e7 \u05d4\u05d4\u05ea\u05d7\u05dc\u05d4,\u00a0\u05d5\u05d4\u05dd \u05d2\u05dd \u05e6\u05e8\u05d9\u05db\u05d9\u05dd \u05dc\u05d4\u05d2\u05df \u05e2\u05dc \u05d4\u05de\u05d9\u05d3\u05e2 \u05d5\u05dc\u05d5\u05d5\u05d3\u05d0 \u05de\u05d9\u05dc\u05d5\u05d9 \u05e9\u05dc \u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4.<\/p>\n<p>\u05d1- Cloud-native , &quot;\u05e8\u05e7&quot; DevOps \u05d6\u05d4 \u05dc\u05d0 \u05de\u05e1\u05e4\u05d9\u05e7 &#8211;\u00a0\u05d0\u05dc\u05d0 \u05d3\u05e8\u05d5\u05e9 secure DevOps !<\/p>\n<p>Sysdig \u05de\u05e9\u05dc\u05d1 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2, \u05e6\u05d9\u05d5\u05ea \u05dc\u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d5\u05e0\u05d9\u05e8\u05d0\u05d5\u05ea &#8211; \u05dc\u05d8\u05d5\u05d1\u05ea \u05ea\u05d4\u05dc\u05d9\u05db\u05d9 DevOps \u05de\u05d0\u05d5\u05d1\u05d8\u05d7\u05d9\u05dd<\/p>\n<p>\u05d1\u05e2\u05d6\u05e8\u05ea Sysdig Secure , \u05e0\u05d9\u05ea\u05df \u05dc\u05d4\u05d8\u05de\u05d9\u05e2 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 &#8211; \u05d4\u05d7\u05dc \u05de\u05e1\u05e8\u05d9\u05e7\u05d4 \u05d5\u05d6\u05d9\u05d4\u05d5\u05d9 \u05d0\u05d9\u05d5\u05de\u05d9\u05dd<\/p>\n<p>\u05d3\u05e8\u05da \u05de\u05e0\u05d9\u05e2\u05d4, \u05ea\u05d2\u05d5\u05d1\u05d4 \u05de\u05d4\u05d9\u05e8\u05d4, \u05d4\u05e9\u05d2\u05ea \u05e0\u05d9\u05e8\u05d0\u05d5\u05ea \u05d8\u05d5\u05d1\u05d4 \u05d9\u05d5\u05ea\u05e8 \u05d1\u05db\u05d3\u05d9 \u05dc\u05de\u05e0\u05d5\u05e2 \u05ea\u05e7\u05dc\u05d5\u05ea \u05d5\u05dc\u05d6\u05e8\u05d6 \u05d0\u05ea \u05ea\u05d9\u05e7\u05d5\u05e0\u05df<\/p>\n<p>\u05d5\u05dc\u05d5\u05d5\u05d3\u05d0 \u05de\u05d9\u05dc\u05d5\u05d9 \u05de\u05d3\u05d5\u05d9\u05e7 \u05e9\u05dc \u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4<\/p>\n<p>Sysdig \u05de\u05d1\u05d5\u05e1\u05e1\u05ea \u05e7\u05d5\u05d3-\u05e4\u05ea\u05d5\u05d7 (Falco \u05d5- Promethues) \u05d4\u05e2\u05d5\u05d6\u05e8 \u05d1\u05e9\u05d9\u05e4\u05d5\u05e8 \u05d4\u05d1\u05d9\u05e6\u05d5\u05e2\u05d9\u05dd \u05d5\u05d9\u05db\u05d5\u05dc\u05ea \u05d4- scale<\/p>\n<p>\u05d5\u05de\u05d5\u05e1\u05d9\u05e3 \u05de\u05d9\u05d3\u05e2 \u05dc\u05d0\u05e4\u05dc\u05d9\u05e7\u05e6\u05d9\u05d4 \u05d5\u05d7\u05d3\u05e9\u05e0\u05d5\u05ea \u05d1\u05ea\u05d4\u05dc\u05d9\u05db\u05d9 \u05d4\u05e2\u05d1\u05d5\u05d3\u05d4, \u05d4\u05e2\u05d5\u05d6\u05e8\u05d9\u05dd \u05dc\u05e9\u05d9\u05de\u05d5\u05e9\u05d9\u05d5\u05ea.<\/p>\n<p>\u05d1\u05ea\u05e7\u05d5\u05e4\u05d4 \u05e9\u05d1\u05d4 \u05d6\u05de\u05d9\u05e0\u05d5\u05ea \u05d0\u05e4\u05dc\u05d9\u05e7\u05e6\u05d9\u05d4 \u05d7\u05e9\u05d5\u05d1\u05d4 \u05de\u05d0\u05d9\u05df \u05db\u05de\u05d5\u05d4,\u00a0\u05d4\u05d5\u05e1\u05e4\u05ea security \u05d5- compliance \u05dc\u05ea\u05d4\u05dc\u05d9\u05db\u05d9 \u05d4- DevOps \u05e9\u05dc\u05da \u05d7\u05e9\u05d5\u05d1\u05d4 \u05d4\u05e8\u05d1\u05d4 \u05d9\u05d5\u05ea\u05e8 \u05de\u05d1\u05e2\u05d1\u05e8.<\/p>\n<p>\u05d1\u05e2\u05d6\u05e8\u05ea \u05e4\u05ea\u05e8\u05d5\u05df Sysdig Secure , \u05e0\u05d9\u05ea\u05df \u05dc\u05d4\u05e8\u05d9\u05e5 Kubernetes \u05d5\u05e7\u05d5\u05e0\u05d8\u05d9\u05d9\u05e8\u05d9\u05dd \u05d1\u05e1\u05d1\u05d9\u05d1\u05d5\u05ea production\u00a0\u05d1\u05d0\u05d5\u05e4\u05df \u05de\u05ea\u05de\u05e9\u05da \u05d5\u05d1\u05d1\u05d8\u05d7\u05d4<\/p>\n<p><strong><em>\u05e4\u05e0\u05d5 \u05d0\u05dc\u05d9\u05e0\u05d5 \u05dc\u05de\u05d9\u05d3\u05e2 \u05e0\u05d5\u05e1\u05e3: <a href=\"mailto:sysdig@almtoolbox.com\" target=\"_blank\" rel=\"noopener\">sysdig@almtoolbox.com<\/a> \u05d0\u05d5 \u05d8\u05dc\u05e4\u05d5\u05e0\u05d9\u05ea 072-240-5222<\/em><\/strong><\/p>\n<h3 dir=\"ltr\">Transcription &#8211; Sysdig Secure:<\/h3>\n<p dir=\"ltr\"><span class=\"style-scope yt-formatted-string\" dir=\"auto\">The rapid pace of digital transformation is accelerating the shift to cloud-native applications using containers and Kubernetes to speed the pace of delivery. <\/span><\/p>\n<p dir=\"ltr\"><span class=\"style-scope yt-formatted-string\" dir=\"auto\">But application delivery is one thing. Application uptime performance and protection are another. <\/span><\/p>\n<p dir=\"ltr\"><span class=\"style-scope yt-formatted-string\" dir=\"auto\">For cloud teams already running production one fact is clear, monitoring and troubleshooting are only the beginning. <\/span><span class=\"style-scope yt-formatted-string\" dir=\"auto\">They also need to own security and compliance for their apps. <\/span><\/p>\n<p dir=\"ltr\"><span class=\"style-scope yt-formatted-string\" dir=\"auto\">In cloud-native DevOps is not enough. It's time for secure DevOps. <\/span><\/p>\n<p dir=\"ltr\"><span class=\"style-scope yt-formatted-string\" dir=\"auto\">Sysdig converges security and compliance with visibility for secure DevOps workflows. <\/span><\/p>\n<p dir=\"ltr\"><span class=\"style-scope yt-formatted-string\" dir=\"auto\">With Sysdig secure DevOps platform, cloud teams can embed security from scanning through threat detection prevention and response gained deeper visibility to prevent issues and expedite fixes and precisely validate application compliance <\/span><\/p>\n<p dir=\"ltr\"><span class=\"style-scope yt-formatted-string\" dir=\"auto\">The Sysdig platform is built on an open-source foundation enhancing performance and scalability and adding app context and workflow innovations to improve usability. <\/span><\/p>\n<p dir=\"ltr\"><span class=\"style-scope yt-formatted-string\" dir=\"auto\">In an era when application availability is everything integrating security and compliance into your DevOps workflows simply make sense. With Sysdig secure DevOps platform cloud teams can run Kubernetes and containers in production, continuously and confidently. <\/span><\/p>\n<p dir=\"ltr\"><span class=\"style-scope yt-formatted-string\" dir=\"auto\">Make your move to secure DevOps with Sysdig<\/span><\/p>\n<p dir=\"ltr\">\n<h3 style=\"text-align: right;\">\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05e8\u05dc\u05d1\u05e0\u05d8\u05d9\u05dd:<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/sysdig-webinar-threat-detection\/\" target=\"_blank\" rel=\"noopener\">\u05d4\u05e7\u05dc\u05d8\u05ea \u05d5\u05d5\u05d1\u05d9\u05e0\u05e8: \u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc Containers \u05d5- Kubernetes \u05d1\u05d0\u05de\u05e6\u05e2\u05d5\u05ea Sysdig<\/a> (\u05e2\u05d1\u05e8\u05d9\u05ea)<\/li>\n<li><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/falco-sysdig\/\" target=\"_blank\" rel=\"noopener\">\u05d4\u05e1\u05d1\u05e8 \u05e2\u05dc Falco<\/a> &#8211; \u05d4\u05de\u05e0\u05d5\u05e2 \u05e2\u05dc\u05d9\u05d5 \u05de\u05d1\u05d5\u05e1\u05e1 Sysdig Secure<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u05de\u05d5\u05d6\u05de\u05e0\u05d9\u05dd \u05dc\u05e6\u05e4\u05d5\u05ea \u05d1\u05e1\u05e8\u05d8\u05d5\u05df \u05e7\u05e6\u05e8\u05e6\u05e8 (\u05d3\u05e7\u05d4 \u05d5\u05d7\u05e6\u05d9) \u05e2\u05dc \u05e4\u05ea\u05e8\u05d5\u05df Sysdig Secure \u05d4\u05e4\u05ea\u05e8\u05d5\u05df \u05de\u05d9\u05d5\u05e2\u05d3 \u05dc\u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d1- Cloud-native &#8211; \u05d2\u05dd \u05d1\u05e2\u05e0\u05df \u05d5\u05d2\u05dd \u05d1\u05e8\u05e9\u05ea\u05d5\u05ea \u05e1\u05d2\u05d5\u05e8\u05d5\u05ea \u05dc\u05e0\u05d5\u05d7\u05d9\u05d5\u05ea\u05db\u05dd \u05ea\u05e8\u05d2\u05de\u05e0\u05d5 \u05d5\u05d4\u05d5\u05e1\u05e4\u05e0\u05d5 \u05db\u05ea\u05d5\u05d1\u05d9\u05d5\u05ea, \u05d5\u05ea\u05e7\u05e6\u05d9\u05e8. \u05d0\u05e0\u05d5 \u05de\u05d9\u05d9\u05e6\u05d2\u05d9\u05dd \u05d0\u05ea \u05de\u05d5\u05e6\u05e8\u05d9 Sysdig \u05d1\u05d0\u05e8\u05e5, \u05d5\u05dc\u05e6\u05d3 \u05e8\u05e9\u05d9\u05d5\u05e0\u05d5\u05ea \u05d5\u05de\u05e6\u05d9\u05e2\u05d9\u05dd \u05d2\u05dd \u05d9\u05e2\u05d5\u05e5, \u05d4\u05d8\u05de\u05e2\u05d4 \u05d5\u05d4\u05d3\u05e8\u05db\u05d4. \u05e4\u05e0\u05d5 \u05d0\u05dc\u05d9\u05e0\u05d5 \u05dc\u05de\u05d9\u05d3\u05e2 \u05e0\u05d5\u05e1\u05e3: sysdig@almtoolbox.com \u05d0\u05d5 \u05d8\u05dc\u05e4\u05d5\u05e0\u05d9\u05ea 072-240-5222 &nbsp; \u05ea\u05e7\u05e6\u05d9\u05e8 \u05e1\u05e8\u05d8\u05d5\u05df Sysdig Secure: \u05d4\u05e7\u05e6\u05d1 \u05d4\u05de\u05d4\u05d9\u05e8 \u05e9\u05dc [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,60,189,164,477],"tags":[478],"class_list":["post-5423","post","type-post","status-publish","format-standard","hentry","category-cloud","category-devops","category-devsecops","category-kubernetes","category-sysdig","tag-cloud-native"],"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/5423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/comments?post=5423"}],"version-history":[{"count":0,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/5423\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media?parent=5423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/categories?post=5423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/tags?post=5423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}