Resources

Product datasheets, technical whitepapers and guides, webinars, events, and more educational resources to help you learn about securing production Linux environments.
  • All
  • Analyst Reports
  • Datasheets
  • Infographics
  • Quick Reads
  • Video
  • Webinars
  • Whitepapers
All
  • All
  • Analyst Reports
  • Datasheets
  • Infographics
  • Quick Reads
  • Video
  • Webinars
  • Whitepapers
resource-capsule8-protect-whitepaper Whitepapers

Capsule8 Protect

Capsule8 Protect is the Linux protection solution that keeps production environments free of compromise while preserving the high performance and …

Read More →
website-doing-devsecops-right Webinars

Doing DevSecOps Right: Implementation & the Metrics that Matter

Join Amy DeMartine and Kelly Shortridge, vice president of product strategy at Capsule8, to learn not only how to implement …

Read More →
resource-drive-toward-automated-soc increasingly

Driving Toward the Automated SOC

SOCs need to be empowered: boosting the accuracy of threat detection and shortening the time to response – and doing …

Read More →
resource-datasheet-c8-for-operations Datasheets

An Overview of Capsule8 for Operations

Read this primer to understand how Capsule8 has been architected to alleviate and mitigate concerns raised by operations stakeholders charged …

Read More →
resource-datasheet-c8-pci-compliance capsule8

Capsule8 for PCI Compliance

As businesses look to comply and, more importantly, protect cardholder data across Linux-based environments whether in the data center or …

Read More →
resource-demo-Capsule8-detection-methods Datasheets

Demo: Detection Capabilities of Capsule8 Protect

Learn how Capsule8 Protect delivers the right kind of data, at the right time – for each stage in an …

Read More →
resource-ids-ineffective-linux-production cloud

Why IDS is Ineffective for Linux Production Environments

Organizations are evolving and modernizing their production environments with technologies like cloud, microservices and containers, and are more often mixed …

Read More →
Resilient Infrastructure framework

Digging Down into Resilient Infrastructure

During our 20/20 webcast Resilience is not futile, we discussed the importance of building resilience into your security program. As …

Read More →
resource-detection-methods Datasheets

Capsule8’s Attack Detection Methods

Gain technical insight into Capsule8’s design philosophy behind detection methods as well as insight into the differences between kernel-level, userland, …

Read More →
Scroll to Top