CISO at a recruiting/HR firm with 51-200 employees
Real User
Top 20
2024-05-01T06:45:00Z
May 1, 2024
We use Sysdig Secure to gain visibility into our runtime workloads. We use a whole bunch of security tools to scan our images before they get deployed into our production clusters. We needed a tool to give us runtime visibility and threat detection. By implementing Sysdig Secure, we were trying to see any gaps. When an image is running, we wanted to see if any high or medium-scale vulnerabilities were picked up during the scanning and were running in a live workflow. We understood that we had a gap there. If there was a threat for us, we wanted to make sure that we knew and that we could scan our environment for any zero-day threats or vulnerabilities in general.
Global Information Security Officer at a tech services company with 51-200 employees
Real User
Top 20
2024-03-26T21:33:00Z
Mar 26, 2024
We use Sysdig for cloud and Kubernetes posture management, including Kubernetes workload security, image vulnerabilities, and pipeline vulnerabilities. We use it across 2 of our cloud vendors: AWS and GCP.
DevOps Specialist at a manufacturing company with 10,001+ employees
Real User
Top 10
2023-08-22T14:47:00Z
Aug 22, 2023
The use case involves a robust security tool. We conducted evaluations of numerous tools to enhance our security measures. This assessment extended beyond just the systems. We also considered Falco, their open-source version, and Sysdig Falco Platform. Notably, the Falco Platform is integrated into the Sysdig Secure product. The central theme here is security in the context of Sysdig Secure. This tool offers security solutions for various domains including containerized platforms, virtual machines, VDI setups, and safeguarding code repositories like GitHub and Bitbucket. Furthermore, the tool provides insights that stand out distinctly from other products available today. Despite using Microsoft Defender for our virtual machines, it doesn't match up to the comprehensive outcomes delivered by Sysdig Secure. The tool furnishes detailed reports on aspects such as Intrusive Communication, thread level, process level, network level, specific ports, ingress and egress traffic, etc. This comprehensive vantage point empowers vigilant monitoring of all activities within the environment.
Security Consultant at a tech services company with 1,001-5,000 employees
Consultant
Top 20
2023-02-16T14:54:00Z
Feb 16, 2023
I got the product for Dell SecOps. I am also interested in Kubernetes Stack and managed that product because it gives importance to the CI/CD pipeline security and most importantly the Falco Project. There are lots of big brands that contribute to Falco so I give importance to it. Moreover, Sysdig is also the founder of Wireshark and I think they are creating importance in the security area.
In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights, a unique AI architecture, and open source Falco. Sysdig delivers live visibility by correlating signals across cloud workloads, identities, and services to uncover hidden attack paths. By knowing what is running, teams can prioritize the vulnerabilities,...
We use Sysdig Secure to gain visibility into our runtime workloads. We use a whole bunch of security tools to scan our images before they get deployed into our production clusters. We needed a tool to give us runtime visibility and threat detection. By implementing Sysdig Secure, we were trying to see any gaps. When an image is running, we wanted to see if any high or medium-scale vulnerabilities were picked up during the scanning and were running in a live workflow. We understood that we had a gap there. If there was a threat for us, we wanted to make sure that we knew and that we could scan our environment for any zero-day threats or vulnerabilities in general.
We use Sysdig for cloud and Kubernetes posture management, including Kubernetes workload security, image vulnerabilities, and pipeline vulnerabilities. We use it across 2 of our cloud vendors: AWS and GCP.
We employ SQL for vulnerability scanning, compliance scanning, security intrusion detection, and drift detection.
The use case involves a robust security tool. We conducted evaluations of numerous tools to enhance our security measures. This assessment extended beyond just the systems. We also considered Falco, their open-source version, and Sysdig Falco Platform. Notably, the Falco Platform is integrated into the Sysdig Secure product. The central theme here is security in the context of Sysdig Secure. This tool offers security solutions for various domains including containerized platforms, virtual machines, VDI setups, and safeguarding code repositories like GitHub and Bitbucket. Furthermore, the tool provides insights that stand out distinctly from other products available today. Despite using Microsoft Defender for our virtual machines, it doesn't match up to the comprehensive outcomes delivered by Sysdig Secure. The tool furnishes detailed reports on aspects such as Intrusive Communication, thread level, process level, network level, specific ports, ingress and egress traffic, etc. This comprehensive vantage point empowers vigilant monitoring of all activities within the environment.
We are a cloud provider, and we use the solution to collate some issues in our environment.
The solution is used for runtime security of containers, cloud security, CSPM, and CWPP.
I got the product for Dell SecOps. I am also interested in Kubernetes Stack and managed that product because it gives importance to the CI/CD pipeline security and most importantly the Falco Project. There are lots of big brands that contribute to Falco so I give importance to it. Moreover, Sysdig is also the founder of Wireshark and I think they are creating importance in the security area.