Resource Library
Explore our library of webinars, datasheets, and other content to learn more about cloud-native security and Deepfence solutions.
Cloud Security Resource Library
Datasheet
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/65287b30169abed436ae6b36_datasheet%20.png)
Download the Datasheet
Webinar
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/6685a8b456e2b2a1ae88c332_GenAI%20webinar%20(2).png)
Advanced Detection & Response Strategies for Gen AI Threats
Webinar
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/65fc7dd59bf36909d7f4aca3_OSS%20Roundtable.png)
Open Source Security Roundtable
Webinar
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/65a5aa074fce364c01658896_Webinar%20mastering%20AI.png)
Maserting AI-Driven Cloud Security
Webinar
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/6578c7b674a5f364c37a8147_ThreatRx%20Blog%20Email.png)
ThreatRx - AI Powered Threat Remediation
Webinar
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/650ca5e07975ec219dea470a_Agent%20webinar%20(1).png)
Fortifying Cloud Security:
Unveiling the Potential of Next-Generation Agent Sensors
Webinar
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64de3d96be66ee726d7b9b8f_featured%20image%20webinar%20(3).png)
Unleashing ThreatStryker:
The Future of Real-time Cloud Protection
Webinar
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64c28d2b089cb0365379138f_featured%20image%20webinar%20(1).png)
Runtime Context: The Missing Piece in Cloud Security
Webinar
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/642316b3b53c7a9434be651a_kubernetes-webinar-4.png)
Demystifying Kubernetes Detection and Response
Webinar
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/6423168ebbbb142d096c7b4b_fireside-image-4.png)
Runtime Security Observability for Containerized Workloads
Webinar
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/642317181b4006e9b011c305_Blog-and-Featured-Image-Wordpress-LinkedinArticle-27.png)
Addressing Evolving Threat Models in Cloud Security with Open Source Software
Webinar
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/6423174105503ce099ac742b_Featured-Image-Hubs-300-%C3%97-175-px-4.png)
Understanding Attack Paths
Video
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/642317b0b53c7a352cbe753d_Featured-Image-Hubs-300-%C3%97-175-px-2.png)
Deepfence: ThreatStryker Walkthrough
Webinar
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/642317efd6586d12124ae666_Featured-Image-Hubs-300-%C3%97-175-px.png)
Contextualizing Cloud Security
Guide
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/642318528aada62c7902db2e_guide-Security-Observability.png)
Security Observability: Cyberdefense’s New Frontier
Demo Video
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64231894a1ad6444eb774f7e_demo-video-ThreatMapper-Intro.png)
Deepfence: ThreatMapper Introduction
Video
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/642318f3265b714a098e614c_ThreatMapper-1.3-Demo-Image.png)
Find Flaws Before an Attacker Does with ThreatMapper 1.3
Video
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64231926fa1f7caebaa21d36_detect-and-defeat-log4j-sm.png)
Detect and Defeat the Log4j Vulnerability with Deepfence
Video
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64231959aaa7d1e279c41be3_equifax-log4j.png)
Equifax Then and Log4j Now – Reveal & Seall Off Attack Paths
Video
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/6423198d265b7159308e70b5_how-to-install-ThreatMapper.png)
How to Install ThreatMapper in Kubernetes
Video
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/642319bcd0a502af83c5491b_CNCF-Webinar-Page-Social-ThreatMapper-sm.png)
Open Source Cloud Native Security with ThreatMapper
Video
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/642319e457c23d387a3e75ce_Shift-left-security-at-operations.png)
“Shift Left” Security at Operations? How Does That Work?
Video
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64231a0a845a5fb79c363754_90-second-ThreatMapper-video-cover-sm.png)
90-sec Intro to ThreatMapper
Workshop on demand
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64231a3d50707be92df19753_cloud-native-security-workshop-sm-thumbnail.png)
Cloud Native Security Workshop
Datasheet
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64231a6f63433ec313c0cb57_datasheet-preview.png)
Unified Cloud Native Security Observability
Video
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64231aa157c23d60693e8d3d_new-in-threatmapper-1.2.png)
What’s New in ThreatMapper 1.2
Webinar on demand
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64231ad116d0a507e8590c99_StopHeist.png)
How to D3FEND Against ATT&CKS and Save the Day in ThreatMapper 1.2
Slides
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64231af957c23d46c53e9460_Webinar-slides-stop-the-heist-thumbnail.png)
Stop the Heist: How to D3FEND Against ATT&CKS and Save the Day
Webinar on demand
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64231b2e9c844ac5397dee6e_RuntimeSecurity.png)
Runtime Security Observability for AWS Fargate
Video
![](https://cdn.prod.website-files.com/63eaa07bbe370228bab003ea/64231b5930c096841fd9135d_weaveworks-gitops-webinar.png)
Hardening Your CI/CD Pipelines with GitOps and Continuous Security