Resources

Resources_

Tips, tutorials, and best practices for protecting Linux clouds, and data centers.

press-kit

Digital Transformation Survey Executive Summary

Uncover the findings of 266 IT respondents of the 2021 State of Digital Transformation Survey quickly in this 10-slide Executive Summary. The survey covers the timing, challenges and impact of Covid-19 on enterprises in this survey. The biggest challenge may surprise you.

Whitepaper

State of Digital Transformation Survey – 2021

Digital Transformation is a key initiative at many enterprise organizations currently. Recently, independent research was conducted by ViB, which surveyed 266 IT, cloud and security professionals to determine the timing, challenges and goals surrounding digital transformation. The survey’s findings are outlined in this paper.

Whitepaper

3 Ways to Purchase Cmd to Secure Your Cloud

Cloud marketplaces, including AWS and Google Cloud, offer a way to purchase Cmd on your existing cloud enterprise agreements. Discover how you secure your cloud infrastructure within a few clicks. 3 Ways to Purchase Cmd to Secure Your Cloud

Datasheet

Digital Transformation & Security: Executive Learnings and Insights

This recent market research conducted by Incisiv shows how enterprise Chief Digital Officers and Chief Information Security Officers can work together to ensure their cloud implementations are secured and their organizations meet their transformation goals.

Whitepaper

3 Reasons to Consider Securing Your Cloud Infrastructure Separately

You likely consider securing your cloud infrastructure similarly to the way you secure your desktops and laptops. Cloud workloads aren’t the same and need to be secured differently. Read this case study which shows three reasons to think about them differently and how this could impact your return on investment positively. 3 Reasons to Secure…

Case Study
Rails logo

Cmd Academy: Get Security Back on the Rails, RubyonRails That Is_

Cmd Academy shares security best practices with the overall security community. This whitepaper about how to help secure RubyonRails is no different. It offers step-by-step guidance on how to configure Cmd to further strengthen your Ruby instance. Dig in!

Whitepaper
Airplane

US Airline Saves $150k and 130 SecOps Hours

Read how this Leading US Airline leveraged Cmd to monitor and protect their Linux infrastructure.

Case Study
SolutionSheet IDR

Infrastructure Detection & Response for Linux

This document explains how Cmd provides Infrastructure Detection and Incident Response for Linux workloads

Datasheet

GoodData Reduces the Total Cost of Ownership of Compliance by 50% with Cmd_

GoodData is keen to think outside the box and move beyond conventional wisdom, which has proven to be a highly effective growth strategy.

Case Study

The Essential Eight: Cmd Mapping

Read this guide to learn how Cmd can assist in adhering to a number of the criteria outlined for Linux Infrastructure in the ACSC Essential Eight framework.

Whitepaper

Gremlin Goes into Chaos Engineering Beast Mode with Cmd

Together with Cmd, Gremlin’s DevOps and SecOps teams are able to manage Production Linux environments with greater visibility, speed, and efficiency.

Case Study

Best Practices on Understanding Who is in Your Cloud

Learn how to use free and open-source tools to discover who’s in your cloud so you can meet your compliance requirements and improve your security posture quickly.

Webinar

Cmd Customers Talk About Their Experiences on Risky Business #591

In this episode of the Risky Business podcast, hosts Patrick and Adam have a chance to talk to two folks who have implemented Cmd to solve their Ops and Security challenges within their Production Linux environments.

Podcast

PDX OWASP Podcast: A Sudden Shift in Threat Modeling

Listen in as CEO, Jake King, joins the PDX OWASP Podcast to discuss how to build and maintain diversity in the security industry & much more.

Podcast

Address PCI Requirement #10 with Cmd

This document explains how Cmd maps to PCI Requirement 10: tracking and monitoring access to network resources and cardholder data.

Datasheet

Making a Science of Compliance: Logging and Monitoring Production Linux Environments

Join us in this Cmd Academy session to learn how Cmd can support compliance efforts for Production Linux.

Webinar

Who’s In Your Cloud? How Privileged Access Controls are Leaving You Exposed

Join Cmd’s Head of Security, John Brunn, to learn why it’s so difficult to understand and locate who is in your cloud, and how to fix it.

Webinar

How To Harden Production Linux for Maximum Security

Cmd delivers a simple, easy way to harden the Linux operating system in production environments where sensitive data and critical applications are run.

Webinar

See The Security Platform that DevOps Prefers

Join us for a demo of Cmd’s security platform, where we show you how to create guardrails and controls for privileged and shared accounts to restrict dangerous and sensitive actions, even for root users.

Webinar

Cmd for Production Linux vs. Legacy PAM

Download this solution sheet to see how Cmd can protect your production Linux environment – better than legacy PAM would.

Datasheet

Next Generation Linux Server Security

This whitepaper looks at the deficiencies of Linux from the security perspective and how to lock down your Linux environment effectively.

Whitepaper

Defense in Depth: Shared Accounts & Other Bad Habits

Accounts. We’ve all got them—probably more of them than we even know. As companies grow, move to the cloud, and change from one platform to another, accounts have a way to proliferate. That’s true for named accounts, and it’s true for the cockroach of software: shared accounts. No matter what you do, they always seem…

Podcast

Best Practices For Understanding Who Is In Your Cloud

CEO, Jake King, will be discussing best practices for understanding who is in your cloud (the good guys and the bad) and what to do about it. You’ll also learn how to use free and open-source tools so you can meet your compliance requirements and improve your security posture quickly.

Webinar

Hacker Days: Visualizing the Void of Security Audit Data

Join CEO, Jake King, as he discusses the detection of three well-defined security problems – adversarial user behavior, lateral movement, and insider threat detection – using a relatively untapped data set: shell and session commands.

Webinar

CmdAcademy: How to Audit Who is in Your Cloud – The Good and the Bad

Learn how to use Cmd to manage who has access to your cloud environment and see who’s actually logging in.

Webinar

How to Use Access Guardrails to Protect Your Cloud & Empower DevOps

Watch this webcast to replace heavy-handed access controls with lightweight, agile access guardrails.

Webinar

Redefining Privileged Access Management for Agile Cloud Environments

Learn how privileged access inside cloud environments is different, and what you need to do to adapt.

Webinar

SANS Institute: Taming Linux for Enterprise Security

This webcast examines Linux from a security perspective and how to lock it down more effectively.

Webinar

7 Techniques for Ramping Your DevSecOps Program Quickly

These battle-tested tricks will help your DevOps team ramp security fast and still deliver code on time.

Webinar

Four Reasons Why Linux Attacks Will Grow in 2020

Learn about the reasons Linux is becoming an increasingly more attractive target in 2020.

Whitepaper

Linux Security Self-Assessment

Download this checklist to assess how your Linux environment compares to the best protected ones out there.

Datasheet

Cmd vs. OSquery

This comparison shows how Cmd provides real-time visibility and control that far surpasses osquery on Linux.

Datasheet

Cmd vs. Auditd

This comparison shows how Cmd is faster, easier, and more flexible than Auditd for logging and auditing on Linux.

Datasheet

Addressing SOC2 Compliance

This document details how Cmd maps to the latest specific SOC 2 Trust Services Criteria (2017 TSC).

Whitepaper

Cmd for Securing High-Velocity DevOps on Linux Clouds

Learn how Cmd protects production Linux environments without slowing DevOps down.

Datasheet

Cmd for High-Fidelity Threat Detection & Incident Response on Linux

Learn how Cmd provides high-fidelity telemetry and incident response for Production Linux environments.

Datasheet

Cmd for Cloud Compliance & Auditing

Learn how Cmd provides command-line visibility and policy enforcement for cloud compliance and auditing.

Datasheet

CISO Roundtable on the Transition to Remote Work

Kevin Paige, CISO of Flexport, discusses how being a CISO during COVID-19 and the transition to remote work.

Video

Cmd Sponsors Darknet Diaries 52: Magecart

Listen to Jack Rhysider dive deep into the growing popularity of credit card skimming off of websites.

Podcast

Cmd Sponsors Darknet Diaries 54: NotPetya

Listen to Jack Rhysider tell the story of NotPetya, the first time we’ve seen what a cyber war looks like.

Podcast

Jake King discusses MITRE ATT&CK on Risky Biz #560

Hear Jake discuss our work applying the MITRE ATT&CK framework to Linux and container environments.

Podcast

Risky Biz Soap Box: Cmd’s Jake King talks Linux security

Patrick Gray and CEO Jake King talk about Linux event data, AI and alerts, and the upcoming release of Cmd Free.

Podcast

Cmd Product Overview

Two-minute explainer video showing off Cmd’s solution for securing Production Linux.

Video

Cmd for Securing Root Users & Privileged Accounts

Learn how Cmd monitors and enforces policy for privileged users, root users, and shared accounts.

Datasheet

A SANS Whitepaper – Taming the Wild West: Finding Security on Linux

This whitepaper examines Linux from a security perspective and how to lock it down more effectively.

Whitepaper
Copy link
Powered by Social Snap