Webinar

eBPF Runtime Security with Tetragon: Insights from v1.14

Register to learn technical updates and user stories from Tetragon, highlighting unique insights from the 1.14 release and hear about the Tetragon buzz during KubeCon.

  • November 21

    5PM CET | 8:00AM PST | 11:00AM EST (1 hour)

    Online

Unlocking Runtime Security with Tetragon: Insights from v1.14

Discover the latest advancements in eBPF runtime security with Tetragon! Join Natália Réka Ivánkó, Senior Product Manager for Tetragon, and author of O’Reilly’s Security Observability with eBPF, and Jeremy Colvin, Sr. Technical Marketing Engineer – Security, in this live interactive webinar as they discuss key technical updates and explore real-world use cases, showing how Tetragon addresses critical challenges in modern Cloud Native environments.

We will share unique updates and user stories from KubeCon and the Tetragon 1.14 release.

 

What you’ll learn:

  • The latest Tetragon features creating all the buzz around at KubeCon
  • Deep-dive into real user stories and case studies
  • How Tetragon enhances runtime security and observability in production environments
  • Practical insights on implementing and scaling Tetragon in your infrastructure

Whether exploring Tetragon for the first time or being an experienced user looking to optimize your setup, this webinar is designed to give you actionable insights and strategies for building a more secure infrastructure with Tetragon + eBPF.

Can’t wait to dive into this topic? You can already read the blog about this release: Isovalent Enterprise for Tetragon 1.14: Persistent Enforcement, Memory Optimizations, Improved Child Process Visibility, and more! 

Speakers

Do you have any questions?Contact us

Related Content

Blogs

eBPF Security Observability: Top Tetragon Use Cases (Part 1)

Tetragon is the standard for eBPF-based security observability, let’s look at what that means for the top use cases being solved.

By
Jeremy Colvin
Labs

Getting Started with Tetragon

Security Observability is a new paradigm that utilizes eBPF, a Linux kernel technology, to allow Security and DevOps teams, SREs, Cloud Engineers, and Solution Architects to gain real-time visibility into Kubernetes and helps to secure your production environment with Tetragon. Tetragon is an open source Security Observability and Runtime Enforcement tool from the makers of Cilium. It captures different process and network event types through a user-supplied configuration to enable security observability on arbitrary hook points in the kernel; then translates these events into actionable signals for a Security Team. The best way to learn about Security Observability and Cilium Tetragon is to read the book “Security Observability with eBPF” by Jed Salazar and Natalia Reka Ivanko. And the best way to have your first experience with Tetragon is to walk through this lab, which takes the Real World Attack example out of the book and teaches you how to detect a container escape step by step!

White papers

The Blueprint for Kubernetes Compliance

Supercharge your cloud-native compliance with the white paper from Isovalent and ControlPlane! Master NIST-800 and other key compliance frameworks in cloud-native environments, with insights tailored for technical experts and leadership teams alike.   What’s inside: Executive Summary: A comprehensive overview designed for both technical audiences and leadership teams. NIST 800 Controls: A detailed analysis connecting specific features to control requirements. The Cilium, Tetragon, and eBPF Platform: Implementation guidance from across the Isovalent platform, applicable to any compliance framework.   From Strategy to Action:  Future-Proof Your Compliance: Stay ahead in the ever-evolving landscape of cloud-native compliance. Deep Technical Insights: Gain expert knowledge to tackle compliance challenges effectively with the Isovalent platform. Strategic Value: Build your architecture with the foundations to navigate Kubernetes and Linux compliance.   Download the Cilium white paper now and take the first step towards mastering cloud-native compliance!

By
Natália Réka IvánkóJeremy Colvin