Webinar

What’s new in eBPF Runtime Security with Tetragon 1.15

Boost your Runtime Security strategy! Don’t miss this deep dive into the latest eBPF features with Tetragon 1.15. Learn cutting-edge tools, actionable insights, and practical strategies to safeguard your Kubernetes environments. Register now!

What’s new in eBPF Runtime Security with Tetragon 1.15
  • March 5

    5PM CET | 8:00AM PST | 11:00AM EST (1 hour)

    Online

Unlocking Runtime Security with Tetragon: Insights from v1.15

Unlock the next level of Runtime Security with eBPF and the latest Tetragon 1.15 Release! This webinar is your opportunity to explore cutting-edge advancements in runtime security and learn practical strategies to enhance the protection of your Kubernetes environments.


Join Natália Réka Ivánkó, Senior Product Manager for Tetragon, and author of O’Reilly’s Security Observability with eBPF, and Jeremy Colvin, Sr. Technical Marketing Engineer – Security, as they explore: 

  • Enhanced eBPF Monitoring and Security: Accurately measure CPU and memory overhead of eBPF programs and audit operations with the all-new TracingPolicies.
  • Advanced Filtering Capabilities: Secure your environment with improved userspace filtering and robust File Integrity Monitoring.
  • Comprehensive Process Insights: Track processes in depth with the new “in_init_tree” field, giving you complete visibility and control.


Whether you’re DevOps, SecOps, or part of a Kubernetes platform team, this session will deliver actionable ways to leverage the full potential of eBPF and Tetragon 1.15.

Can’t make it to the webinar? Register anyway and we will send you the recording!

Want to learn even more? Read our blog about this release for additional details and expert analysis.

Speakers

Do you have any questions?Contact us

Related Content

Labs

Getting Started with Tetragon

Security Observability is a new paradigm that utilizes eBPF, a Linux kernel technology, to allow Security and DevOps teams, SREs, Cloud Engineers, and Solution Architects to gain real-time visibility into Kubernetes and helps to secure your production environment with Tetragon. Tetragon is an open source Security Observability and Runtime Enforcement tool from the makers of Cilium. It captures different process and network event types through a user-supplied configuration to enable security observability on arbitrary hook points in the kernel; then translates these events into actionable signals for a Security Team. The best way to learn about Security Observability and Cilium Tetragon is to read the book “Security Observability with eBPF” by Jed Salazar and Natalia Reka Ivanko. And the best way to have your first experience with Tetragon is to walk through this lab, which takes the Real World Attack example out of the book and teaches you how to detect a container escape step by step!

Blogs

eBPF Security Observability: Top Tetragon Use Cases (Part 1)

Tetragon is the standard for eBPF-based security observability, let’s look at what that means for the top use cases being solved.

By
Jeremy Colvin
Blogs

Isovalent Enterprise for Tetragon 1.15: CPU & Memory Metrics, Audit eBPF Operations, Improved Userspace Filtering!

Isovalent Enterprise for Tetragon 1.15: CPU & Memory Metrics, Audit eBPF Operations, Advanced Filtering!

By
Jeremy Colvin