Content added to Folio

DevOps Resource Center

Add Filters
Filter by:
A Guide to the Well-Architected Framework
Multi Cloud

A Guide to the Well-Architected Framework

This article explores the five pillars of the Amazon Web Services (AWS) and Azure Well-Architected Framework, examining best practices and design principles to leverage the cloud in a more efficient, secure, and cost-effective manner.

December 16, 2020
Multi Cloud

Create Efficient Well-Architected Cloud Infrastructure

This article explores the Performance Efficiency pillar of the Amazon Web Services and Azure Well-Architected Framework. We will examine how to create performance efficiency in the compute, storage, database, and network elements of cloud infrastructures.

How To Jan 15, 2021

Save to Folio

How To Jan 15, 2021

Save to Folio

Multi Cloud

Build a Secure Well-Architected Cloud Environment

Explore the Security pillar of the AWS and Azure Well-Architected Framework and be guided through the fundamental security controls that should be addressed when designing, transitioning to, and operating in a cloud environment.

How To Dec 21, 2020

Save to Folio

How To Dec 21, 2020

Save to Folio

Multi Cloud

Achieve Operational Excellence in Your Cloud Workload

Explore the Operational Excellence pillar of the AWS and Azure Well-Architected Framework and examine best practices and design principles for cloud-based security operations, including CI/CD and risk management.

How To Dec 18, 2020

Save to Folio

How To Dec 18, 2020

Save to Folio

Cloud Native

Free Trial of Trend Micro Cloud One

Experience cloud security simplified with a 30-day trial of Trend Micro Cloud One™, a security services platform for organizations building in the cloud.

Trials Dec 17, 2020

Save to Folio

Trials Dec 17, 2020

Save to Folio

Multi Cloud

A Guide to the Well-Architected Framework

This article explores the five pillars of the Amazon Web Services (AWS) and Azure Well-Architected Framework, examining best practices and design principles to leverage the cloud in a more efficient, secure, and cost-effective manner.

How To Dec 16, 2020

Save to Folio

How To Dec 16, 2020

Save to Folio

Workloads

How to protect a Docker host before deploying applications

Watch how quick and easy it is to use Trend Micro Cloud One™ to protect a Docker® host before deploying an application in this demo by Marc Tabago, Sales Engineer at Trend Micro.

How To Oct 27, 2020

Save to Folio

How To Oct 27, 2020

Save to Folio

Containers

What is Docker Content Trust and How do You Secure It?

Can your container image be trusted? Learn how Docker Content Trust (DCT) employs digital signatures for container image verification and manages trusted collections of content.

Research Oct 14, 2020

Save to Folio

Research Oct 14, 2020

Save to Folio

Serverless

Basics of Keeping Kubernetes Clusters Secure Part 2

We outline security mitigations and settings that should be prioritized in a clustered environment. The second part of our security guide on Kubernetes clusters covers best practices related to worker nodes, the kubelet, pods, and audit logs.

Research Oct 08, 2020

Save to Folio

Research Oct 08, 2020

Save to Folio