We're a Forbes Top 20 Cybersecurity Startup to Watch!
Tips, tutorials, and best practices for protecting Linux clouds, and data centers.
This document explains how Cmd maps to PCI Requirement 10: tracking and monitoring access to network resources and cardholder data.
Join us in this Cmd Academy session to learn how Cmd can support compliance efforts for Production Linux.
See how Cmd’s detection and response capabilities, designed exclusively for Production Linux, differ from established solutions.
Join Cmd’s Head of Security, John Brunn, to learn why it’s so difficult to understand and locate who is in your cloud, and how to fix it.
Cmd delivers a simple, easy way to harden the Linux operating system in production environments where sensitive data and critical applications are run.
Join us for a demo of Cmd’s security platform, where we show you how to create guardrails and controls for privileged and shared accounts to restrict dangerous and sensitive actions, even for root users.
Download this solution sheet to see how Cmd can protect your production Linux environment – better than legacy PAM would.
This whitepaper looks at the deficiencies of Linux from the security perspective and how to lock down your Linux environment effectively.
Accounts. We’ve all got them—probably more of them than we even know. As companies grow, move to the cloud, and change from one platform to another, accounts have a way to proliferate. That’s true for named accounts, and it’s true for the cockroach of software: shared accounts. No matter what you do, they always seem…
CEO, Jake King, will be discussing best practices for understanding who is in your cloud (the good guys and the bad) and what to do about it. You’ll also learn how to use free and open-source tools so you can meet your compliance requirements and improve your security posture quickly.
Join CEO, Jake King, as he discusses the detection of three well-defined security problems – adversarial user behavior, lateral movement, and insider threat detection – using a relatively untapped data set: shell and session commands.
Learn how to use Cmd to manage who has access to your cloud environment and see who’s actually logging in.
Watch this webcast to replace heavy-handed access controls with lightweight, agile access guardrails.
Learn how privileged access inside cloud environments is different, and what you need to do to adapt.
This webcast examines Linux from a security perspective and how to lock it down more effectively.
These battle-tested tricks will help your DevOps team ramp security fast and still deliver code on time.
Learn about the reasons Linux is becoming an increasingly more attractive target in 2020.
Download this checklist to assess how your Linux environment compares to the best protected ones out there.
This comparison shows how Cmd provides real-time visibility and control that far surpasses osquery on Linux.
This comparison shows how Cmd is faster, easier, and more flexible than Auditd for logging and auditing on Linux.
This document details how Cmd maps to the latest specific SOC 2 Trust Services Criteria (2017 TSC).
Learn how Cmd protects production Linux environments without slowing DevOps down.
Learn how Cmd provides high-fidelity telemetry and incident response for Production Linux environments.
Learn how Cmd provides command-line visibility and policy enforcement for cloud compliance and auditing.
Kevin Paige, CISO of Flexport, discusses how being a CISO during COVID-19 and the transition to remote work.
Listen to Jack Rhysider dive deep into the growing popularity of credit card skimming off of websites.
Listen to Jack Rhysider tell the story of NotPetya, the first time we’ve seen what a cyber war looks like.
Hear Jake discuss our work applying the MITRE ATT&CK framework to Linux and container environments.
Patrick Gray and CEO Jake King talk about Linux event data, AI and alerts, and the upcoming release of Cmd Free.
Two-minute explainer video showing off Cmd’s solution for securing Production Linux.
Learn how Cmd monitors and enforces policy for privileged users, root users, and shared accounts.