Resources

Learn more about Kubernetes security and observability, and see how Tigera helps customers secure, observe, and troubleshoot cloud-native applications in Kubernetes environments

Calico for Network Security and Observability

View more>

Scalable Security and DevSecOps with Calico’s Network Policy Model for Kubernetes

View more>

Networking and Security with Red Hat OpenShift Virtualization and Calico

View more>

LLM Security: Top 10 Risks and 5 Best Practices

View more>

Quick Guide to OWASP Top 10 LLM: Threats, Examples & Prevention

View more>

Generative AI Security: 6 Critical Risks and Defending Your Organization

View more>

7 Generative AI Security Risks and How to Defend Your Organization

View more>

Prompt Injection: Impact, How It Works, and 4 Defense Measures

View more>

Buyer’s Guide: Calico vs Cilium for Kubernetes Users

View more>

Get full stack network security and observability for your Kubernetes workloads

View more>

Universal Microsegmentation For Containers, VMs, and Bare Metal with Calico

View more>

Enhance Your Kubernetes Security Posture with Egress Access Controls

View more>

The Calico Advantage: How It Drives Business Success

View more>

Calico for container networking and security

View more>

eBPF Explained: Use Cases, Concepts, and Architecture

View more>

Observability and Troubleshooting for Kubernetes-native Workloads

View more>

Calico for Container Networking and Security

View more>

S&P Global 451 Market Insight: Tigera Provides Most Comprehensive CNAPP

View more>

Tigera named a leader in GigaOM’s Sonar Report for Container Networking

View more>

Egress Gateway for Kubernetes

View more>

How leading financial institutions safeguard their Kubernetes deployments

View more>

The State of Calico Open Source: Usage & Adoption

View more>

Extending Fortinet Enterprise Security Into Kubernetes Environments

View more>

Deutsch – Calico for Kubernetes Security

View more>