Sysdig CEO on How Open Source Fuels Cloud, Container Defense

Suresh Vasudevan on Why Falco Has Become the Industry Standard for Threat Detection
Suresh Vasudevan, CEO, Sysdig (Image: Sysdig)

Cloud vendors from Amazon, Microsoft and Google to IBM and Sumo Logic have turned to Sysdig's Falco open-source threat detection engine to secure their environments.

See Also: Building Better Security Operations Centers With AI/ML

Sysdig CEO Suresh Vasudevan says Falco has become the standard for threat detection in the industry, catalyzing a robust ruleset around how to detect threats everywhere, from cloud and containers to serverless environments. Cloud hyperscalers turn to Falco for runtime security and data collection while Sysdig itself relies on Falco for vulnerability management, configuration, posture management and compliance (see: Business Imperative: Cloud Adoption, With Security).

"When more and more companies standardize on Falco, it makes that a default, and it helps make the standard safer when it's more broadly used," Vasudevan says. "The DNA of our company started with Falco, and that still remains a cornerstone of our product."

In a video interview with Information Security Media Group, Vasudevan also discusses:

  • How Sysdig has used proceeds from its $350M Series G round;
  • How Sysdig has secured the Kubernetes customer experience;
  • How Sysdig stacks up against Palo Alto Networks' Prisma Cloud.

Prior to joining Sysdig in February 2018, Vasudevan was the president and CEO of Nimble Storage from March 2011 until it was acquired by Hewlett Packard Enterprise in May 2017. Before Nimble Storage, he was a member of the executive team at NetApp for 10 years, overseeing all product operations. Before joining NetApp, he worked at management consulting firm McKinsey in New Delhi, Mumbai and Chicago as a senior engagement manager.

About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.