dig.sysdig.com Open in urlscan Pro
52.7.58.29  Public Scan

Submitted URL: http://email.b2btechinsight.com/c/11rYencZ27YPrZQ0Vrgx3CJKw6pE
Effective URL: https://dig.sysdig.com/c/pf-case-study-icg-consulting?x=u_WFRi;utm_source=ant&utm_medium=email&utm_campaign=icg...
Submission: On August 26 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

THIS WEBSITE USES COOKIES

Sysdig uses cookies to personalize content and ads, to provide social media
features and to analyze our traffic. We also share information about your use of
our site with our social media, advertising and analytics partners. You can at
any time change or withdraw your consent from the Cookie Declaration on our
website.
[#OOI_PERSONAL_INFORMATION#]
Use necessary cookies only Accept Show details
OK
Use necessary cookies only Allow selection Allow all cookies
Necessary
Preferences
Statistics
Marketing
Show details
Cookie declaration [#IABV2SETTINGS#] About
 Necessary (18)  Preferences (4)  Statistics (33)  Marketing (80)  Unclassified
(14)
Necessary cookies help make a website usable by enabling basic functions like
page navigation and access to secure areas of the website. The website cannot
function properly without these cookies.

NameProviderPurposeExpiryType__cf_bm [x3]Marketo
go.sysdig.com
TechTargetThis cookie is used to distinguish between humans and bots. This is
beneficial for the website, in order to make valid reports on the use of their
website.1 dayHTTPCookieConsent [x3]CookiebotStores the user's cookie consent
state for the current domain1 yearHTTPBIGipServer#go.sysdig.comUsed to
distribute traffic to the website on several servers in order to optimise
response times.SessionHTTPCONSENT [x2]Google
YouTubeUsed to detect if the visitor has accepted the marketing category in the
cookie banner. This cookie is necessary for GDPR-compliance of the website. 2
yearsHTTPrc::aGoogleThis cookie is used to distinguish between humans and bots.
This is beneficial for the website, in order to make valid reports on the use of
their website.PersistentHTMLrc::cGoogleThis cookie is used to distinguish
between humans and bots. SessionHTMLli_gcLinkedInStores the user's cookie
consent state for the current domain179
daysHTTPX-Salesforce-CHATSalesforceNecessary for the functionality of the
website's chat-box function. SessionHTTPCookieConsentPolicySalesforceStores the
user's cookie consent state for the current domain1
yearHTTPLSKey-c$CookieConsentPolicySalesforceDetermines whether the user has
accepted the cookie consent box. 1 yearHTTP_ce.cchCrazyeggStores the user's
cookie consent state for the current
domainSessionHTTPce_successful_csp_checksysdig.comDetects whether user behaviour
tracking should be active on the website.
PersistentHTMLuserIdtracking.intentsify.ioPreserves users states across page
requests.10 yearsHTTP

Preference cookies enable a website to remember information that changes the way
the website behaves or looks, like your preferred language or the region that
you are in.

NameProviderPurposeExpiryTypeCookieConsentBulkSetting-#CookiebotEnables cookie
consent across multiple
websitesPersistentHTML_lbvisitedPathFactoryPendingPersistentHTML_lbvisitedcountPathFactoryPendingPersistentHTMLvidPathFactoryCollects
data on visitor interaction with the website's video-content - This data is used
to make the website's video-content more relevant towards the visitor. 2
yearsHTTP

Statistic cookies help website owners to understand how visitors interact with
websites by collecting and reporting information anonymously.

NameProviderPurposeExpiryTypec.gifMicrosoftCollects data on the user’s
navigation and behavior on the website. This is used to compile statistical
reports and heatmaps for the website owner.SessionPixelCLIDMicrosoftCollects
data on the user’s navigation and behavior on the website. This is used to
compile statistical reports and heatmaps for the website owner.1
yearHTTPBrowserIdSalesforceRegisters a unique ID that identifies the user's
device for return visits.1 yearHTTPBrowserId_secSalesforceRegisters statistical
data on users' behaviour on the website. Used for internal analytics by the
website operator. 1 yearHTTPcollectGoogleUsed to send data to Google Analytics
about the visitor's device and behavior. Tracks the visitor across devices and
marketing channels.SessionPixelAnalyticsSyncHistoryLinkedInUsed in connection
with data-synchronization with third-party analysis service. 29
daysHTTPsysdig.comLA_VISITOR_INFOSalesforcePendingSessionHTML_at.hist.#OracleUsed
by the social sharing platform AddThis to store the user's usage history of the
AddThis sharing widgetPersistentHTML_ce.gtldCrazyeggHolds which URL should be
presented to the visitor when visiting the site.
SessionHTTP_ce.ssysdig.comCollects data on the user’s navigation and behavior on
the website. This is used to compile statistical reports and heatmaps for the
website owner.1 yearHTTP_clckMicrosoftCollects data on the user’s navigation and
behavior on the website. This is used to compile statistical reports and
heatmaps for the website owner.1 yearHTTP_clskMicrosoftRegisters statistical
data on users' behaviour on the website. Used for internal analytics by the
website operator. 1 dayHTTP_cltkMicrosoftRegisters statistical data on users'
behaviour on the website. Used for internal analytics by the website operator.
SessionHTML_gaGoogleRegisters a unique ID that is used to generate statistical
data on how the visitor uses the website.2 yearsHTTP_ga_#GoogleUsed by Google
Analytics to collect data on the number of times a user has visited the website
as well as dates for the first and most recent visit. 2 yearsHTTP_gatGoogleUsed
by Google Analytics to throttle request rate1 dayHTTP_gidGoogleRegisters a
unique ID that is used to generate statistical data on how the visitor uses the
website.1 dayHTTP_hjAbsoluteSessionInProgressHotjarThis cookie is used to count
how many times a website has been visited by different visitors - this is done
by assigning the visitor an ID, so the visitor does not get registered twice.1
dayHTTP_hjFirstSeenHotjarThis cookie is used to determine if the visitor has
visited the website before, or if it is a new visitor on the website.1
dayHTTP_hjIncludedInPageviewSampleHotjarDetermines if the user's navigation
should be registered in a certain statistical place holder.1
dayHTTP_hjIncludedInSessionSampleHotjarRegisters data on visitors'
website-behaviour. This is used for internal analysis and website optimization.
1 dayHTTP_hjRecordingLastActivityHotjarSets a unique ID for the session. This
allows the website to obtain data on visitor behaviour for statistical
purposes.SessionHTML_hjSession_#HotjarCollects statistics on the visitor's
visits to the website, such as the number of visits, average time spent on the
website and what pages have been read.1 dayHTTP_hjSessionUser_#HotjarCollects
statistics on the visitor's visits to the website, such as the number of visits,
average time spent on the website and what pages have been read.1
yearHTTPce_clocksysdig.comSets a timestamp for when the visitor entered the
website. This is used for analytical purposes on the website.
PersistentHTMLcebssysdig.comTracks the individual sessions on the website,
allowing the website to compile statistical data from multiple visits. This data
can also be used to create leads for marketing
purposes.SessionHTTPcebspsysdig.comThis cookie is used to determine when the
visitor last visited the different subpages on the
website.SessionHTTPcetabidsysdig.comSets a unique ID for the session. This
allows the website to obtain data on visitor behaviour for statistical
purposes.SessionHTMLhjViewportIdHotjarSets a unique ID for the session. This
allows the website to obtain data on visitor behaviour for statistical
purposes.SessionHTMLsnapinsPage_#SalesforcePendingPersistentHTMLsnapinsPageTime_#SalesforcePendingPersistentHTMLsnapinsPcSalesforceDetermines
when the visitor last visited the different subpages on the website, as well as
sets a timestamp for when the session
started.PersistentHTMLsnapinsStartSalesforceDetermines when the visitor last
visited the different subpages on the website, as well as sets a timestamp for
when the session started.PersistentHTML

Marketing cookies are used to track visitors across websites. The intention is
to display ads that are relevant and engaging for the individual user and
thereby more valuable for publishers and third party advertisers.

NameProviderPurposeExpiryTypelocOracleGeolocation, which is used to help
providers determine how users who share information with each other are
geographically located (state level).13 monthsHTTPuvcOracleDetects how often the
social sharing service, AddThis, encounters the same user.13
monthsHTTPxtcOracleRegisters the user's sharing of content via social media.13
monthsHTTPlang [x2]LinkedInRemembers the user's selected language version of a
websiteSessionHTTPrp.gifRedditNecessary for the implementation of the
Reddit.com's share-button
function.SessionPixelactivity/activity.gifTechTargetCollects information on user
behaviour on multiple websites. This information is used in order to optimize
the relevance of advertisement on the website.SessionPixelbitoBeeswaxSets a
unique ID for the visitor, that allows third party advertisers to target the
visitor with relevant advertisement. This pairing service is provided by third
party advertisement hubs, which facilitates real-time bidding for advertisers.1
yearHTTPbitoIsSecureBeeswaxPresents the user with relevant content and
advertisement. The service is provided by third-party advertisement hubs, which
facilitate real-time bidding for advertisers.1
yearHTTPcheckForPermissionBeeswaxDetermines whether the visitor has accepted the
cookie consent box. 1 dayHTTPlog/cnvBeeswaxPendingSessionPixelMRMicrosoftUsed to
track visitors on multiple websites, in order to present relevant advertisement
based on the visitor's preferences. 6 daysHTTPMUID [x2]MicrosoftUsed widely by
Microsoft as a unique user ID. The cookie enables user tracking by synchronising
the ID across many Microsoft domains.1 yearHTTPSRM_BMicrosoftTracks the user’s
interaction with the website’s search-bar-function. This data can be used to
present the user with relevant products or services. 1
yearHTTPANONCHKMicrosoftRegisters data on visitors from multiple visits and on
multiple websites. This information is used to measure the efficiency of
advertisement on websites. 1 dayHTTPSMMicrosoftRegisters a unique ID that
identifies the user's device during return visits across websites that use the
same ad network. The ID is used to allow targeted
ads.SessionHTTPtuuidDemandBaseCollects visitor data related to the user's visits
to the website, such as the number of visits, average time spent on the website
and what pages have been loaded, with the purpose of displaying targeted ads.2
yearsHTTPtuuid_luDemandBaseContains a unique visitor ID, which allows
Bidswitch.com to track the visitor across multiple websites. This allows
Bidswitch to optimize advertisement relevance and ensure that the visitor does
not see the same ads multiple times. 2 yearsHTTPvalidateCookieDemandBaseUsed in
context with Account-Based-Marketing (ABM). The cookie registers data such as
IP-addresses, time spent on the website and page requests for the visit. This is
used for retargeting of multiple users rooting from the same IP-addresses. ABM
usually facilitates B2B marketing purposes.SessionPixelIDEGoogleUsed by Google
DoubleClick to register and report the website user's actions after viewing or
clicking one of the advertiser's ads with the purpose of measuring the efficacy
of an ad and to present targeted ads to the user.1
yearHTTPpagead/landing [x2]GoogleCollects data on visitor behaviour from
multiple websites, in order to present more relevant advertisement - This also
allows the website to limit the number of times that they are shown the same
advertisement. SessionPixeltest_cookieGoogleUsed to check if the user's browser
supports cookies.1 dayHTTPtrMeta Platforms, Inc.Used by Facebook to deliver a
series of advertisement products such as real time bidding from third party
advertisers.SessionPixelads/ga-audiencesGoogleUsed by Google AdWords to
re-engage visitors that are likely to convert to customers based on the
visitor's online behaviour across websites.SessionPixelNIDGoogleRegisters a
unique ID that identifies a returning user's device. The ID is used for targeted
ads.6 monthsHTTPpagead/1p-user-list/#GoogleTracks if the user has shown interest
in specific products or events across multiple websites and detects how the user
navigates between sites. This is used for measurement of advertisement efforts
and facilitates payment of referral-fees between
websites.SessionPixelcsGumgumCollects data on the user across websites - This
data is used to make advertisement more relevant.1
yearHTTP_session_id [x2]jukebox.pathfactory.com
PathFactoryStores visitors' navigation by registering landing pages - This
allows the website to present relevant products and/or measure their
advertisement efficiency on other websites. 2 yearsHTTPbcookieLinkedInUsed by
the social networking service, LinkedIn, for tracking the use of embedded
services.1 yearHTTPbscookieLinkedInUsed by the social networking service,
LinkedIn, for tracking the use of embedded services.1 yearHTTPlidcLinkedInUsed
by the social networking service, LinkedIn, for tracking the use of embedded
services.1 dayHTTPUserMatchHistoryLinkedInUsed to track visitors on multiple
websites, in order to present relevant advertisement based on the visitor's
preferences. 29 daysHTTPoktgidOktopostCollects information on user behaviour on
multiple websites. This information is used in order to optimize the relevance
of advertisement on the website.1 yearHTTPoktsidOktopostCollects information on
user behaviour on multiple websites. This information is used in order to
optimize the relevance of advertisement on the
website.SessionHTTP__atuvcOracleUpdates the counter of a website's social
sharing features.13 monthsHTTP__atuvsOracleEnsures that the updated counter is
displayed to the user if a page is shared with the social sharing service,
AddThis.1 dayHTTP_at.cwwOracleUsed by the social sharing platform
AddThisPersistentHTML_fbp Meta Platforms, Inc.Used by Facebook to deliver a
series of advertisement products such as real time bidding from third party
advertisers.3 monthsHTTP_gac_UA-#GoogleStores information about ad campaigns
from Google Adwords to show targeted ads to the visitor.3
monthsHTTP_gaexpwww.googleoptimize.comThis cookie is used by Google Analytics to
determine if the visitor is involved in their marketing experiments.75
daysHTTP_gcl_auCookiebotUsed by Google AdSense for experimenting with
advertisement efficiency across websites using their services. 3
monthsHTTP_gcl_awCookiebotUsed to measure the efficiency of the website’s
advertisement efforts, by collecting data on the conversion rate of the
website’s ads across multiple websites.3 monthsHTTP_hjRecordingEnabledHotjarThis
cookie is used to identify the visitor and optimize ad-relevance by collecting
visitor data from multiple websites – this exchange of visitor data is normally
provided by a third-party data-center or
ad-exchange.SessionHTML_mkto_trkMarketoContains data on visitor behaviour and
website interaction. This is used in context with the email marketing service
Marketo.com, which allows the website to target visitors via email. 2
yearsHTTP_rdt_uuidRedditUsed to track visitors on multiple websites, in order to
present relevant advertisement based on the visitor's preferences. 3
monthsHTTP_uetsidMicrosoftCollects data on visitor behaviour from multiple
websites, in order to present more relevant advertisement - This also allows the
website to limit the number of times that they are shown the same advertisement.
1 dayHTML_uetsid_expMicrosoftContains the expiry-date for the cookie with
corresponding name. PersistentHTML_uetvidMicrosoftUsed to track visitors on
multiple websites, in order to present relevant advertisement based on the
visitor's preferences. 1 yearHTML_uetvid_expMicrosoftContains the expiry-date
for the cookie with corresponding name.
PersistentHTMLat-lojson-cache-#v1.addthisedge.comUsed by the social sharing
platform AddThisPersistentHTMLat-randOracleUsed by the social sharing platform
AddThisPersistentHTMLgclidsysdig.comUsed to send data to Google Analytics about
the visitor's device and behavior. Tracks the visitor across devices and
marketing channels.13 daysHTTPsnowplowOutQueue_#_post2CloudflareCollects
statistical data related to the user's website visits, such as the number of
visits, average time spent on the website and what pages have been loaded. The
purpose is to segment the website's users according to factors such as
demographics and geographical location, in order to enable media and marketing
agencies to structure and understand their target groups to enable customised
online
advertising.PersistentHTMLsnowplowOutQueue_#_post2.expiresCloudflareCollects
statistical data related to the user's website visits, such as the number of
visits, average time spent on the website and what pages have been loaded. The
purpose is to segment the website's users according to factors such as
demographics and geographical location, in order to enable media and marketing
agencies to structure and understand their target groups to enable customised
online advertising.PersistentHTMLutm_campaignsysdig.comCollects information on
user preferences and/or interaction with web-campaign content - This is used on
CRM-campaign-platform used by website owners for promoting events or products.13
daysHTTPutm_contentsysdig.comUsed to send data to Google Analytics about the
visitor's device and behavior. Tracks the visitor across devices and marketing
channels.13 daysHTTPutm_mediumsysdig.comCollects information on user preferences
and/or interaction with web-campaign content - This is used on
CRM-campaign-platform used by website owners for promoting events or products.13
daysHTTPutm_sourcesysdig.comDetermines how the visitor accessed the website -
This information is used by the website operator in order to determine the
efficiency of their marketing efforts. 13 daysHTTPutm_termsysdig.comDetermines
how the user accessed the website. This information is used by the website
operator in order to measure the efficiency of their marketing. 13
daysHTTPi/adsct [x2]Twitter Inc.The cookie is used by Twitter.com in order to
determine the number of visitors accessing the website through Twitter
advertisement content. SessionPixelmuc_adsTwitter Inc.Collects data on user
behaviour and interaction in order to optimize the website and make
advertisement on the website more relevant. 2 yearsHTTPr/beaconAmobeeUsed to
track the visitor across multiple devices including TV. This is done in order to
re-target the visitor through multiple channels. SessionPixeluidAmobeeCollects
anonymous data related to the user's visits to the website, such as the number
of visits, average time spent on the website and what pages have been loaded,
with the purpose of displaying targeted ads.179
daysHTTPpersonalization_idTwitter Inc.This cookie is set by Twitter - The cookie
allows the visitor to share content from the website onto their Twitter profile.
2 yearsHTTPVISITOR_INFO1_LIVEYouTubeTries to estimate the users' bandwidth on
pages with integrated YouTube videos.179 daysHTTPYSCYouTubeRegisters a unique ID
to keep statistics of what videos from YouTube the user has
seen.SessionHTTPyt.innertube::nextIdYouTubeRegisters a unique ID to keep
statistics of what videos from YouTube the user has
seen.PersistentHTMLyt.innertube::requestsYouTubeRegisters a unique ID to keep
statistics of what videos from YouTube the user has
seen.PersistentHTMLytidb::LAST_RESULT_ENTRY_KEYYouTubeStores the user's video
player preferences using embedded YouTube
videoPersistentHTMLyt-remote-cast-availableYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTMLyt-remote-cast-installedYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTMLyt-remote-connected-devicesYouTubeStores the user's video player
preferences using embedded YouTube
videoPersistentHTMLyt-remote-device-idYouTubeStores the user's video player
preferences using embedded YouTube
videoPersistentHTMLyt-remote-fast-check-periodYouTubeStores the user's video
player preferences using embedded YouTube
videoSessionHTMLyt-remote-session-appYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTMLyt-remote-session-nameYouTubeStores the user's video player
preferences using embedded YouTube videoSessionHTML

Unclassified cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

NameProviderPurposeExpiryTypeeidapp.storylane.ioPendingPersistentHTMLfp_idapp.storylane.ioPendingPersistentHTMLsid_rsh8n0a5kxljapp.storylane.ioPendingSessionHTMLsid_sr3j1kncx3rgapp.storylane.ioPendingSessionHTMLsid_ypxokaaa7kknapp.storylane.ioPendingSessionHTML_pf_id.c79eCloudflarePending1
dayHTTP_pf_ses.c79eCloudflarePending1 dayHTTPadgroupidsysdig.comPending13
daysHTTPspBeaconPreflight_jukeboxTracker_jukeboxTrackerGooglePendingSessionHTMLspBeaconPreflight_jukeboxTracker_railsTrackerGooglePendingSessionHTMLutm_devicesysdig.comPending13
daysHTTPutm_geosysdig.comPending13 daysHTTPutm_positionsysdig.comPending13
daysHTTPutm_typesysdig.comPending13 daysHTTP

 [#IABV2_LABEL_PURPOSES#]  [#IABV2_LABEL_FEATURES#]  [#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_BODY_FEATURES#]
[#IABV2_BODY_PARTNERS#]

This website uses cookies to personalize content and ads, to provide social
media features and to analyze our traffic.

Cookies are small text files that can be used by websites to make a user's
experience more efficient. The law states that we can store cookies on your
device if they are strictly necessary for the operation of this site.

For all other types of cookies we need your permission. This site uses different
types of cookies. Some cookies are placed by third party services that appear on
our pages. Our Cookie Policy.

Learn more about who we are, how you can contact us and how we process personal
data in our Privacy Policy.



Your consent applies to the following domains: dig.sysdig.com, sysdig.com


Cookie declaration last updated on 14.08.22 by Cookiebot
Thumbnails Document Outline Attachments


Previous

Next
Highlight all Match case
Whole words

Presentation Mode Open Print Download Current View

Go to First Page Go to Last Page

Rotate Clockwise Rotate Counterclockwise

Text Selection Tool Hand Tool

Vertical Scrolling Horizontal Scrolling Wrapped Scrolling

No Spreads Odd Spreads Even Spreads

Document Properties…
Toggle Sidebar

Find
Previous

Next
of 4
Presentation Mode Open Print Download Current View

Tools
Zoom Out

Zoom In
Automatic Zoom Actual Size Page Fit Page Width 50% 75% 100% 125% 150% 200% 300%
400%

Since 1990, ICG Consulting has been a trusted expert in back-office
applications, such as business process automation, advanced technology, and
systems integration. As a result, the company has established a diverse book of
clients, which includes major financial services organizations, energy
companies, well-known hospitality brands, and diversified shipping and logistics
conglomerates. As a software as a service (SaaS) provider, ICG Consulting is
acutely aware that cloud-native challenges need cloud-native solutions, that
existing tools cannot be applied to secure cloud workloads, and that any
cloud-native tools a company adopts should be easy to deploy and
scale."Everything we do is cloud hosted. Obviously, when we launched more than
30 years ago, everything was on-prem, but now it is all cloud hosted,” said Jim
O’Rourke, Director of Business Development at ICG Consulting.With the shift to
cloud-based services, ICG Consulting clients can better scale with the
accelerated growth that ICG Consulting leverages Sysdig and AWS to compete with
major shopsCOMPANY DETAILS:ICG Consulting is a cloud-hosted vendor management
and back office solution for leading companies, including Duke Energy, US Foods,
and Love’s Travel Stops. The company provides vendor portals, web invoicing,
workflow management software, and dynamic discounting along with other solutions
to help businesses communicate, collaborate, and transact.BUSINESS
NEED:•Increase visibility into cloud infrastructure and enhance reporting.•Gain
cost and staffing efficiencies to compete with larger consulting firms.•Add
value to business relationships by improving intelligence and focusing resources
on clients’ biggest security challenges.TECHNICAL NEED•Reduce noise and alert
fatigue.•Automate reporting to enable employees to focus on core
functions.•Accelerate time to identify and fix critical
vulnerabilities.CHALLENGES:•Reducing risk without slowing down
development.•Supporting the client’s journey to maturity from on-prem
environments to the cloud.•Empowering a small team with more robust security and
monitoring capabilities without adding overhead.BUSINESS IMPACT OF
SYSDIG:•Helped generate 15% cost savings by improving the allocation of cloud
resources with better capacity planning.•Eliminated need to hire up to two
additional analysts through automation.•Achieved 30% reduction in alerts without
sacrificing security.•Consolidated 5 tools down to 1.•Increased release pace by
10% per week.INFRASTRUCTURE:Amazon Web Services (AWS)ORCHESTRATIONAmazon Elastic
Kubernetes Service (EKS)CASE STUDY

their sectors have seen, and are offered greater business flexibility, enabled
faster application delivery times, and enhanced security. Overall, the increased
visibility and agility offered through the cloud and ICG Consulting’s services
has helped cut down on invoice process cycle times, reduced costs by millions of
dollars, and significantly lowered support costs for its customers.“We’re proud
to be a real business enabler for our clients, but the topic we all continue to
come back to is how to enhance security in a world where new threats are always
popping up and we are dealing with back-office information – financial and other
personal information,” said O’Rourke. “Equally as important, we want to scale
our own services in a way where we can stay competitive with larger consulting
firms through a higher quality of service with comparable cost.”Scaling open
source to address customer demandEarly in its cloud journey, ICG Consulting
partnered with Amazon Web Services (AWS) because, “For our size, it's important
to have strategic partners who help us, like AWS," said O’Rourke. Additionally,
during the initial move to the cloud, the company leveraged Falco security rules
for visibility into its user logs, services, and activity within its Kubernetes
environment.“Between AWS and Falco, we had a strong multi-level security
strategy to help ensure we had security shored up across a compliant network,”
said Marcus Boelter, Technical Consultant at ICG Consulting. “As we scaled,
Sysdig was the natural next step for us — between the strength of the Sysdig
technology based on Falco and its partnership with AWS, we knew we could deliver
even more, quickly by adopting Sysdig.”Boelter added that, “By the nature of
Kubernetes with its constant updates, it was difficult to understand how we are
dealing with logs as services were created, pods would ramp up and drop off,
‟Between AWS and Falco, we had a strong multi-level security strategy to help
ensure we had security shored up across a compliant network. As we scaled,
Sysdig was the natural next step for us — between the strength of the Sysdig
technology based on Falco and its partnership with AWS, we knew we could deliver
even more, quickly by adopting Sysdig.”– Marcus Boelter, Technical Consultant at
ICG Consulting2Case StudyICG Consulting



More Information Less Information
Close


Enter the password to open this PDF file.


Cancel OK
File name:

-

File size:

-


Title:

-

Author:

-

Subject:

-

Keywords:

-

Creation Date:

-

Modification Date:

-

Creator:

-


PDF Producer:

-

PDF Version:

-

Page Count:

-

Page Size:

-


Fast Web View:

-

Close
Preparing document for printing…
0%
Cancel



LIKE WHAT YOU SEE?

Tell us a bit about yourself and unlock unlimited access.
CASE STUDY. ICG Consulting leverages Sysdig and AWS to compete with major shops
Sysdig MonitorSysdig Secure
LinkedIn LinkTwitter LinkFacebook LinkLike ButtonDownload Link
Start Free Trial



SIGN UP FOR A FREE 30 DAY TRIAL!

Filter by topic

GUIDE. Continuous Security for AWS Cloud and Containerspdf
Sysdig MonitorSysdig SecureAWSCloud Monitoring
PRODUCT BRIEF. Sysdig Secure DevOps Platformpdf
Sysdig MonitorSysdig SecureKubernetes
REPORT. 2022 Cloud-Native Security And Usage Reportpdf
Sysdig MonitorSysdig SecureCloud MonitoringCloud Security
The Sysdig Secure DevOps Platform Architecture Guidepdf
Sysdig MonitorSysdig Secure
GUIDE. Security And Monitoring On Azure Container Servicespdf
Sysdig MonitorSysdig SecureAzureCloud Monitoring
VIDEO. Requirements for Scaling Prometheus: IBMvideo
Sysdig MonitorSysdig SecureCloud MonitoringCloud Security
INFOGRAPHIC. 2021 Container Security and Usage Snapshotpdf
Sysdig MonitorSysdig SecureCloud MonitoringCloud Security
SERVICE BRIEF. Upgrade And Expansionpdf
Sysdig MonitorSysdig SecureProfessional ServicesSysdig Platform
CASE STUDY. BlaBlaCar Empowers Developers to Manage Security Risk with Sysdigpdf
Sysdig MonitorSysdig SecureCloud SecurityCybersecurity
CASE STUDY. LogDNA Delivers Higher Uptime and Improved Customer Experiencepdf
Sysdig MonitorSysdig SecureAWSAmazon Web Services
SERVICE BRIEF. Agent Deploypdf
Sysdig MonitorSysdig SecureProfessional ServicesSysdig Platform
INFOGRAPHIC. Close the Security and Visibility Gap for Containers on AWSpdf
Sysdig MonitorSysdig SecureAWSCloud Monitoring
REPORT. 2021 Container Security And Usage Reportpdf
Sysdig MonitorSysdig SecureCloud MonitoringCloud Security
GUIDE. Get the SaaS Advantagepdf
Sysdig MonitorSysdig SecureCloud MonitoringCloud Security
VIDEO. Sysdig product demonstration.video
Sysdig MonitorSysdig Secure
CASE STUDY. Beekeeper Serves Up Secure Communications, Data, and Applications
Across Cloud Environmentspdf
Sysdig MonitorSysdig Secure
SERVICE BRIEF. Registry Scanningpdf
Sysdig MonitorSysdig SecureProfessional ServicesSysdig Platform
USE CASE. Top 10 Use Cases for the Sysdig Platformpdf
Sysdig MonitorSysdig SecureKubernetes
PARTNER BRIEF. Rancherpdf
Sysdig MonitorSysdig SecureSysdig Platform
CASE STUDY. Worldpay Gains Competitive Edge with Faster Delivery of Innovative
PCI-Compliant Payment Solutions Globallypdf
Sysdig MonitorSysdig SecureDevOpsKubernetes
CASE STUDY. ICG Consulting leverages Sysdig and AWS to compete with major
shopspdf
Sysdig MonitorSysdig Secure
VIDEO. 5 minutes to onboard secure DevOpsvideo
Sysdig MonitorSysdig SecureCloud MonitoringCloud Security
SERVICE BRIEF. Runtime Scanningpdf
Sysdig MonitorSysdig SecureProfessional ServicesSysdig Platform
SERVICE BRIEF. Managed TAE Servicepdf
Sysdig MonitorSysdig SecureProfessional ServicesSysdig Platform
WEBINAR. 451 Research Webinar: Scaling Cloud-Native to Meet Ops & Security
Demandsvideo
Sysdig MonitorSysdig Secure
CASE STUDY. Gini Ensures Adherence to Strict EU Compliance Standards, While
Reducing Dev and Ops Burdenspdf
Sysdig MonitorSysdig SecureAWSAmazon Web Services
VIDEO. Kubernetes and container topology mappingvideo
Sysdig MonitorSysdig SecureDocker
SERVICE BRIEF. Dedicated TAE Servicepdf
Sysdig MonitorSysdig SecureProfessional ServicesSysdig Platform
VIDEO. Cloud Native visibility and security with Sysdig Platform.video
Sysdig MonitorSysdig Secure
VIDEO. ATPCO on deploying Red Hat OpenShift + Sysdig visibility and security
platformvideo
Sysdig MonitorSysdig SecureOpenshiftRed Hat
CASE STUDY. SAP Concur Delivers Secure, Compliant Solutions to More than 50M End
Users Globallypdf
Sysdig MonitorSysdig SecureCloud MonitoringDevOps
SERVICE BRIEF. On-Premise To SaaSpdf
Sysdig MonitorSysdig SecureProfessional ServicesSysdig Platform
VIDEO. Securing and Monitoring AWS Container Servicesvideo
Sysdig MonitorSysdig SecureAWSAmazon Web Services
WEBINAR. LogDNA - Monitoring and Securing Containers on AWS EKS with Sysdigvideo
Sysdig MonitorSysdig SecureAWSCloud Monitoring
CASE STUDY. Quby: Monitor + Secure Java Apps on Mesos Marathonpdf
Sysdig MonitorSysdig SecureMesosMicroservices
VIDEO. Sysdig Company Overview: Reliable and Secure Cloud-Native
Applicationsvideo
Sysdig MonitorSysdig Secure
REPORT. Sysdig Security And Monitoringpdf
Sysdig MonitorSysdig Secure
VIDEO. Sysdig Technical Deep Dive: From Wireshark to Sysdigvideo
Sysdig MonitorSysdig Secure
WEBINAR. DevOps Security, Monitoring and Compliance with OpenShift and
Sysdigvideo
Sysdig MonitorSysdig SecureCloud MonitoringCloud Security
SERVICE BRIEF. CI/CDpdf
Sysdig MonitorSysdig SecureProfessional ServicesSysdig Platform
SERVICE BRIEF. Guided TAE Servicepdf
Sysdig MonitorSysdig SecureProfessional ServicesSysdig Platform
VIDEO. Troubleshooting Processes and Tools: IBMvideo
Sysdig MonitorSysdig SecureCloud MonitoringCloud Security
VIDEO. Journey to Containers: IBMvideo
Sysdig MonitorSysdig SecureCloud MonitoringCloud Security
SERVICE BRIEF. Admissions Controllerpdf
Sysdig MonitorSysdig SecureProfessional ServicesSysdig Platform
TECH TALK. Delivering secure, reliable containers a Sysdig deep divevideo
Sysdig MonitorSysdig Secure
SERVICE BRIEF. On-Premise Health Checkpdf
Sysdig MonitorSysdig SecureProfessional ServicesSysdig Platform
GUIDE. Securing Kubernetes Checklistpdf
Sysdig SecureCloud SecurityCybersecurityKubernetes
GUIDE. Kubernetes Security Guidepdf
Sysdig SecureKubernetes
INFOGRAPHIC. Promql Cheatsheetpdf
Sysdig MonitorCloud MonitoringDevOpsKubernetes
BRIEF. 5 Keys to a Secure DevOps Workflowpdf
Sysdig SecureKubernetes
GUIDE. Kubernetes Monitoring Guidepdf
Sysdig MonitorKubernetes
GUIDE. Prometheus Monitoring Guide: How to Monitor Kubernetespdf
Sysdig MonitorKubernetesPrometheus
PRODUCT BRIEF. Sysdig Securepdf
Sysdig Secure
CASE STUDY. Mercari Uses Sysdig to Secure the Most Widely Used Flea Market App
in Japanpdf
Sysdig SecureCloud SecurityCybersecurityDevOps
VIDEO. Cloud-native security with OpenShift and Sysdig Securevideo
Sysdig SecureOpenshiftRed Hat
GUIDE. Continuous Security and Visibility for Red Hat OpenShiftpdf
Sysdig SecureOpenshiftRed Hat
WHITEPAPER. Six Keys for Scaling Prometheuspdf
Sysdig MonitorPrometheus
USE CASE. User Activity Auditing in Containersvideo
Sysdig Secure
WHITEPAPER. A Comprehensive Approach to Cloud threat Detection and Responsepdf
Sysdig SecureCloud SecurityCloud computing securityCybersecurity
REPORT. SANS 2019 Cloud Security Surveypdf
Sysdig SecureCloud SecuritySysdig Platform
GUIDE. NIST 800-53 Compliance for Containers and Cloudpdf
Sysdig SecureAuditCloud SecurityCybersecurity
TECH TALK. How to manage vulnerabilities in container environmentsvideo
Sysdig Secure
GUIDE. 5 Steps to Securing Multi-Cloud Infrastructurepdf
Sysdig SecureAWSAmazon Web ServicesCloud Security
GUIDE. O'Reilly Practical Cloud Native Security With Falcopdf
Sysdig SecureCloud SecuritySecuritySysdig Platform
VIDEO. Fargate Scanning In Under 4 Minutesvideo
Sysdig SecureAWSAmazon Web ServicesCloud Security
REPORT. SANS 2021 Cloud Security Surveypdf
Sysdig SecureCloud SecurityCybersecuritySecurity
INFOGRAPHIC. 2020 Container Security Snapshotpdf
Sysdig SecureCloud SecurityDevOpsKubernetes
USE CASE. Container Forensics Analysis and Postmortemvideo
Sysdig Secure
VIDEO. How to Get Started with Sysdig Monitorvideo
Sysdig Monitor
VIDEO. Sysdig Secure Overviewvideo
Sysdig Secure
GUIDE. AWS Fargate Checklistpdf
Sysdig SecureAWSAmazon Web ServicesCloud Security
REPORT. 2021 Gartner Market Guide for Cloud Workload Protection Platforms
(CWPP)pdf
Sysdig SecureCloud SecurityCybersecuritySecurity
REPORT. Cyberedge 2020 Cyberthreat Defense Reportpdf
Sysdig SecureCloud SecurityCybersecuritySysdig Platform
GUIDE. NIST 800-190 Application Security Guide Checklistpdf
Sysdig Secure
SOLUTION BRIEF. Sysdig Secure for AWS Fargatepdf
Sysdig SecureAWSAmazon Web ServicesCloud Security
VIDEO NL. Bereid je voor op de volgende log4j!video
Sysdig SecureApplication securityCloud SecurityCybersecurity
VIDEO. Scaling Prometheus Monitoring: IBMvideo
Sysdig MonitorCloud MonitoringIBMIBM products
VIDEO. Secure DevOps practices at Yahoo! Japanvideo
Sysdig SecureCloud SecurityCybersecurityDevOps
GUIDE. Sysdig Guide To SOC 2 Compliancepdf
Sysdig SecureCloud SecurityCybersecuritySecurity
CASE STUDY. The Control Group: Real-time Container Visibilitypdf
Sysdig Monitor
BLOG. SOC 2 compliance for containers and Kubernetes securitywebpage
Sysdig SecureCloud SecurityCybersecurityKubernetes
WEBINAR. Automating Security for DevOps Workflowsvideo
Sysdig SecureCloud Security
BLOG. Monitoring AWS Lambda with Prometheus and Sysdigwebpage
Sysdig MonitorAWSCloud MonitoringPrometheus
GUIDE. A guide to PCI Compliance in Containers and Kubernetespdf
Sysdig Secure
VIDEO. Sysdig Monitor: Overview of Alertsvideo
Sysdig MonitorCloud MonitoringDevOpsKubernetes
GUIDE. Container & Cloud Security Comparison Checklist: Sysdig vs CheckPoint
CloudGuardpdf
Sysdig SecureCloud SecurityCybersecurityDevOps
SOLUTION BRIEF: Container Security From Code To Runtimepdf
Sysdig SecureCloud SecurityData securitySecurity
SOLUTION BRIEF: IBM and Sysdig: Extending Security and Governance with Cloud Pak
for Multicloud Managementpdf
Sysdig SecureIBMSysdig Platform
TECH TALK. Kubernetes is Moving to Production. Are you ready?video
Sysdig SecureKubernetes
WEBINAR. AWS Security 101: Securing Amazon EKS with Falco & Sysdigvideo
Sysdig SecureAWSCloud SecurityOpen Source
VIDEO. DevOps Teams Addressing Security: IBMvideo
Sysdig SecureCloud MonitoringCloud SecurityIBM
GUIDE. 5 Steps to Securing AWS Cloud Infrastructurepdf
Sysdig SecureAWSAmazon Web ServicesCloud Security
USE CASE. Audit and Container Runtime Security to Detect Anomalous Activityvideo
Sysdig Secure
BRIEF. 5 Keys to a Secure Devops Workflow on AWSpdf
Sysdig SecureAWSAmazon Web ServicesCloud Security
GUIDE. Container Security Comparison Checklist: Sysdig vs CrowdStrikepdf
Sysdig SecureCloud SecuritySecuritySysdig Platform
IDC. Definitive Guide for Evaluating Container and Kubernetes Security Toolspdf
Sysdig SecureKubernetes
PRODUCT BRIEF. Sysdig Monitorpdf
Sysdig Monitor
INFOGRAPHIC. Need to Extend Prometheus Monitoring?pdf
Sysdig MonitorOpen SourcePrometheus
GUIDE. Container & Cloud Security Comparison Checklist: Sysdig vs Rapid7pdf
Sysdig SecureCloud SecurityCybersecurityDevOps
BLOG. Now Available: IBM Cloud Monitoring with Sysdig.webpage
Sysdig MonitorIBM
INFOGRAPHIC. Top 10 Metrics In Postgresql monitoring with Prometheuspdf
Sysdig MonitorCloud MonitoringDevOpsOpen Source
GUIDE. Container Security Comparison Checklist: Sysdig vs Laceworkpdf
Sysdig SecureCloud SecurityCybersecurityDevOps
VIDEO. Getting started with secure DevOpsvideo
Sysdig SecureCloud SecurityCybersecurityDevOps
USE CASE. Container Security Policy Configurationvideo
Sysdig Secure
GUIDE. Kubernetes Monitoring Checklistpdf
Sysdig MonitorCloud MonitoringKubernetesSysdig Platform
BLOG. Monitoring AWS Fargate with Prometheus and Sysdigwebpage
Sysdig MonitorAWSCloud MonitoringPrometheus
TECH TALK. Multi cloud monitoring with Sysdigvideo
Sysdig MonitorAWSAzureGoogle Cloud
SERVICE BRIEF. Sysdig JumpStartpdf
Sysdig SecureDevOps
GUIDE. Securing Containers & Cloud for Dummiespdf
Sysdig SecureCloud SecurityCybersecurityDevOps
VIDEO. How to prepare for the next Log4jvideo
Sysdig SecureApplication securityCloud SecurityCybersecurity
GUIDE. Continuous Security for Google Cloud and Containerspdf
Sysdig SecureCloud SecurityGoogle CloudGoogle Cloud Platform
VIDEO. Openshift Monitoring with Sysdigvideo
Sysdig MonitorOpenshiftRed Hat
GUIDE. Anatomy Of Cloud Attackspdf
Sysdig SecureCloud SecurityCybersecuritySecurity
WEBINAR. Best Practices to Secure Containers and Accelerate Software
Deliveryvideo
Sysdig SecureAWSCloud Security
WEBINAR. Image Scanning Best Practices for Containers and Kubernetesvideo
Sysdig SecureCloud SecurityKubernetes
BLOG. Automating AWS Fargate image scanningwebpage
Sysdig SecureAWSAmazon Web ServicesCloud Security
GUIDE. Container Security Comparison: Sysdig vs Qualyspdf
Sysdig SecureCloud SecurityCybersecurityDevOps
GUIDE. Container and Cloud Security Comparison Checklist: Sysdig vs Orcapdf
Sysdig SecureCloud SecurityCybersecurityDevOps
SOLUTION BRIEF: Sysdig Platform for IBM zSystems & IBM LinuxONEpdf
Sysdig SecureCloud SecurityCloud computing securityData security
TECH TALK. Scaling and Extending Prometheus Monitoringvideo
Sysdig MonitorPrometheus
BLOG. NIST 800-53 compliance for containers and Kuberneteswebpage
Sysdig SecureCloud SecurityCybersecurityKubernetes
REPORT. Achieving Full Lifecycle Devops Security Using Sysdigpdf
Sysdig SecureCloud SecurityCloud computing securityDevOps
SOLUTION BRIEF. Snyk & Sysdig Solution Briefpdf
Sysdig SecureCloud SecurityCybersecurityDevOps
BRIEF. Frost Sullivan Award 2022pdf
Sysdig Secure
GUIDE. 5 Steps To Securing Microsoft Azure Cloud Infrastructurepdf
Sysdig SecureAzureCloud SecurityDevOps
GUIDE. Red Hat + Sysdig PCI Compliance Guidepdf
Sysdig SecureAuditOpenshiftRed Hat
CASE STUDY. Monitoring Java in Docker at CDKpdf
Sysdig MonitorDocker
BRIEF. Top 6 Use Cases Monitoring Cloud Native Workloads With Sysdig Monitorpdf
Sysdig MonitorKubernetes
BRIEF: 6 Considerations For Kubernetes Capacity Planningpdf
Sysdig MonitorKubernetes
TECH TALK. Sysdig & SANS Institute forensics and incident response in
containersvideo
Sysdig Secure
PARTNER BRIEF. Unified Security & Visibility for Google Cloudpdf
Sysdig SecureCloud SecurityGoogle CloudGoogle Cloud Platform
REPORT. SANS 2022 Cloud Security Surveypdf
Sysdig SecureCloud SecurityCybersecuritySecurity
GUIDE. 5 Steps To Securing GCP Cloud Infrastructurepdf
Sysdig SecureCloud SecurityDevOpsGoogle Cloud Platform
CASE STUDY. Everalbum: Container-native Monitoringpdf
Sysdig MonitorAWSGoogle Cloud
VIDEO. You’re Monitoring Kubernetes Wrongvideo
Sysdig MonitorKubernetes
GUIDE. Continuous Cloud Security Checklist For Google Cloudpdf
Sysdig SecureCloud computingGoogle CloudGoogle Cloud Platform
REPORT. Forrester Now Tech Cloud Workload Security Q3 2021pdf
Sysdig SecureCloud SecurityCloud computingCybersecurity
TECH TALK. Securing Kubernetes with Google GKE and Falcowebpage
Sysdig SecureGoogle CloudGoogle Cloud PlatformKubernetes
USE CASE. Container compliance for Docker and Kubernetesvideo
Sysdig SecureDockerKubernetes
BLOG. How to implement an open source container security stackwebpage
Sysdig SecureKubernetesOpen Source
SOLUTION BRIEF. Sysdig & Red Hat Securing Cloud Applications for Financial
Services Companiespdf
Sysdig SecureCloud SecurityRed HatSysdig Platform
TECH TALK. OpenShift Commons Briefing # 113: OpenShift Security & Forensics Best
Practices with Sysdigvideo
Sysdig SecureOpenshiftRed Hat
WEBINAR. Scaling Prometheus Monitoring, the No-Hacks Waywebpage
Sysdig MonitorIBMPrometheus
GUIDE. Cloud Security 101pdf
Sysdig SecureCloud SecuritySysdig Platform
VIDEO. Sysdig Monitor - Cloud-native intelligencevideo
Sysdig MonitorDockerKubernetes
WEBINAR. AWS Observability 101: Kubernetes and Prometheus Monitoring with
Sysdigvideo
Sysdig MonitorAWSCloud MonitoringPrometheus
PARTNER BRIEF. AWSpdf
AWS
GUIDE. 30 60 90 Day Checklistpdf
Cloud MonitoringCloud Security
WEBINAR. Cloud and Container Security for AWSvideo
AWSCloud SecurityKubernetes
GUIDE. Checklist Container Security From Code To Runtimepdf
Application securitySecuritySnyk
WEBINAR. DevNation Federal: DevSecOps What To Focus On Firstvideo
Red Hat
INFOGRAPHIC. 2018 Docker Usage Reportpdf
DockerKubernetesMesosOpenshift
BRIEF. Sysdig Company Overviewpdf
Sysdig Platform
WEBINAR. Automating Container Visibility to Accelerate App Deliveryvideo
Cloud MonitoringCloud SecurityOpenshiftRed Hat
VIDEO. The Sysdig vision.video
Sysdig Platform
REPORT. Cloud Native Observability Solutions Quadrant Report (ISG Research, US
2020)pdf
CASE STUDY. Societe Generale: Four Phases of Successful Docker Adoptionpdf
DockerMicroservices
VIDEO. Containers in Production: Goldman Sachsvideo
KubernetesSysdig Platform
Getting Started with Cloud Securityvideo
VIDEO. KubeCon Intro: Falco - Loris Degioanni, Sysdigvideo
SOLUTION BRIEF. Sysdig Platform for Microsoft Azure and AKSpdf
Azure
CASE STUDY. Goldman Sachs Accelerating Business with Microservicespdf
VIDEO. Extending security with Sysdig and IBM Cloud Pak for Multicloud
Management (MCM)video
INFOGRAPHIC. Securing Kubernetes in Production. Are You Ready?pdf
Kubernetes
VIDEO. Running Cloud-Native Workloads In Production with Sysdigvideo
Case Study: ATPCOpdf
OpenshiftRed HatSysdig Platform
PODCAST. Red Hat X Podcast – May 5, 2020webpage
OpenshiftRed HatSysdig Platform
VIDEO. KubeCon Keynote: Charting a Path to Take Kubernetes to 100,000
Enterprises - Wendy Carteevideo
WEBINAR. PCI Compliance in Containers & Kubernetesvideo
Cloud Security
REPORT. 2018 Docker Usage Reportpdf
DockerKubernetesMesosOpenshift
GUIDE. For Dummies: Running Containers in Productionpdf
DockerKubernetesMicroservicesPrometheus
REPORT. 2017 Docker Usage Reportpdf
DockerKubernetes
TECH TALK. Kubernetes run time security, an example of blocking an application
attackvideo
Kubernetes
WEBINAR: Moving Apps to the Cloud? How Top Financials Reduced their Security &
Compliance Riskvideo
Cloud MonitoringCloud SecurityRed Hat
VIDEO. Unified threat detection across containers and cloud with Sysdigvideo
WEBINAR. Getting Started with Runtime Security for Containers & Kubernetesvideo
Cloud SecurityKubernetes
VIDEO. Sysdig + Red Hat partnership: OpenShift visibility and securityvideo
OpenshiftRed Hat
PARTNER BRIEF. Red Hatpdf
OpenshiftRed Hat
WEBINAR: Deploy Faster by Automating Container Security, Monitoring and
Compliancevideo
Cloud MonitoringCloud Security
REPORT. Cloud Native Container Services Quadrant Report (ISG Research, US
2020)pdf
See All