Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Demo

A SaaS Multi-Cluster Manager for Velero

Welcome to another video on CloudCasa for Velero: A SaaS Multi-Cluster Manager for Velero backups. In this video, Martin Phan, Field CTO for CloudCasa, will show you the first-hand look of the integration that CloudCasa has with Velero and its centralized GUI that helps users manage and monitor their Velero-based backups. You will find out how CloudCasa for Velero is able to aggregate data across multiple Kubernetes clusters across all hybrid and cloud environments. If you are using Velero today, please check this demo on CloudCasa for Velero and learn more about its multi-cluster management functionality and full stack recovery capabilities using the intuitive GUI.

Ad-Hoc Job Runs and Creating backup and Restore Custom Resources for Velero

Welcome to another video on CloudCasa for Velero, in which Martin Phan, Field CTO for CloudCasa, will show you how you can easily form Ad hoc job runs for Velero in CloudCasa. He will also demonstrate how you can create backup and restore Custom Resources in CloudCasa for Velero and get notifications directly from the CloudCasa service that is running within Velero. Through functionality already native to CloudCasa such as full stack recovery, email alerting and role-based access control, CloudCasa for Velero can be that single pane of glass to manage and report on all your Velero installations throughout your enterprise. So do give CloudCasa for Velero a try and do let us know what you think.

Securing private applications with CrowdStrike and AWS Verified Access

CrowdStrike Zero Trust Assessment (CrowdStrike ZTA) provides customers the ability to assess their endpoint security posture, allowing AWS Verified Access to provide conditional access to resources that comply with their organization’s device posture policies.

Introducing Keeper's UI Refresh

The Keeper you know and love is getting a fresh, updated look, with a friendlier, accessible and more intuitive experience. Keeper’s new user interface offers clearer distinctions between elements as well as enhanced clarity and navigation – all improving usability in order for our users to take full advantage of Keeper’s powerful features.

Splunk SOAR Playbooks - Dynamic Identifier Reputation Analysis (Part 1)

The Dynamic Identifier Reputation Analysis playbook is an essential tool for any security operations center (SOC) team looking for a comprehensive view of their environment’s threat landscape. By leveraging MITRE DEFEND's approach for dynamic identifier reputation analysis, SOC teams can quickly identify potential threats and vulnerabilities and take proactive steps towards mitigating risk before it causes damage.

Splunk SOAR Playbooks - Dynamic Identifier Reputation Analysis (Part 2)

The Dynamic Identifier Reputation Analysis playbook is an essential tool for any security operations center (SOC) team looking for a comprehensive view of their environment’s threat landscape. By leveraging MITRE DEFEND's approach for dynamic identifier reputation analysis, SOC teams can quickly identify potential threats and vulnerabilities and take proactive steps towards mitigating risk before it causes damage.

RKVST Track and Trace Demo

This demo is an example of how RKVST was used to collect information from different databases and different suppliers to form a single source of truth for the full lifecycle of an asset - which in this case is a disposal container for nuclear waste. RKVST provenance-as-a-service enables organizations to authenticate data and build trustworthy digital supply chains. It also makes it quick and easy to locate an asset.