DX

white paper
Why do so many DX projects falter? The secret of visualizing the processes necessary for promoting DX 1.67MB/12P PDF
I would like to explain the importance of “business process visualization” and how to proceed as the first step to promote DX.

Github

Document content
Actually important! Learn Binary Management
Smooth development and operation with GitHub
white paper
Product Catalog (357KB/4P)
Lecture materials
How to use GitHub in a bimodal organization (SAISON INFORMATION SYSTEMS CO.,LTD., Ltd.)
Collecting information on GitHub Enterprise usage cases and new functions from the perspective of operational issues (TRUSTBANK, Inc., Ltd.)
Utilization of GHE in intra-mart development (NTT DATA INTRAMART CORPORATION.)
GHE introduction and permeation process at a web contract development site (FORK CORPORATION., Ltd.)
SIOS InnerSource and GitHub (SIOS Technology, Inc., Ltd.)
JFrog Artifactory introduction case study (Rakuten Group, Inc.)
Continuous integration starting with CircleCI (CircleCI Japan)
Supporting information sharing and growth of development teams Introduction of Sider, a code review support service linked to GitHub Enterprise (Sider Co., Ltd.)
Operational example of Lychee Redmine and GitHub and some interesting information (Agileware Agileware Inc., Ltd.)
Development of CI/CD environment with Github Enterprise and Drone.io (Internet Initiative Japan Inc.)
Macnica Private Docker Cloud(Macnica Solutions Corp.)
Will the quality of software improve with the introduction of GitHub Enterprise? Practice in embedded development (RICOH COMPANY,LTD., Ltd.)
What to do when expanding the scale of GitHub Enterprise implementation (Sega Games Co., Ltd.)
GitHub Enterprise Update Work Efficiency Trial (Iret, Inc., Ltd.)
User case
TRUSTBANK, Inc., Ltd. (532KB/2P)
SB Payment Service Corp., Ltd. (530KB/2P)
DMM.com (513KB/2P)
Internet Initiative Japan Inc. (524KB/2P)
KDDI CORPORATION (521KB/2P)

Prisma Cloud (formerly Twistlock)

Document content
Feature article
Introduction to Container Security4.24MB /8P PDF
Despite the obvious benefits in terms of developer productivity, too many cybersecurity professionals are somewhat reluctant to deploy containers in production given all the challenges involved in securing containerized applications. You can also convince me. However, as daunting as it may seem, containers have one very beneficial cybersecurity advantage that cybersecurity teams don't fully appreciate at first.
An introduction to container security
white paper
Vulnerability Image Scanning Is Not Enough Blind Spots in Container Security Implementation of Runtime Protection1.21MB /6P PDF NEW
Container technology is being used by many companies. As a technology indispensable for promoting digital transformation (DX), further expansion of its use is expected in the future. Under these circumstances, ensuring security has emerged as an urgent issue. However, security measures for containers require different requirements from conventional physical/virtual servers, and it is true that many difficult problems stand in the way. This document describes possible threats, points to keep in mind, and functions required for solutions when implementing container security.
Vulnerability Image Scanning Is Not Enough Blind Spots in Container Security and Points in Implementing Runtime Protection
NIST SP800-190 Compliant with Prisma Cloud2.02MB/21P PDF
Prisma Cloud can comprehensively cover almost all of the measures recommended in the container security guidelines "NIST SP800-190" issued by NIST in the United States. This document introduces the details.
The Complete Guide to Kubernetes Security
From NodeUp: The Complete Guide to Kubernetes Security 1.19MB/14P PDF
Much of the discussion about Kubernetes® security centers around the difficulty of securing clusters. Kubernetes has few native security features, making it extremely difficult to secure all layers of a Kubernetes environment. This ebook will show you how to design a security strategy that strengthens rather than hinders other Kubernetes-based processes. Identify Kubernetes security challenges from node up and specific solutions to address each challenge.
The Complete Guide to Kubernetes Security
report
Cloud Native Security State Report15.4MB/37P PDF
The first State of Cloud Native Security Report from Palo Alto Networks and Accenture outlined the techniques, tools and techniques that enterprises around the world are using to manage the security of their cloud native architectures. Based on a survey of 3,000 cloud architecture, information security, DevOps and application development professionals in 5 countries and 5 industries, this report helps you make cloud transformation and cloud usage decisions and understand the potential of the cloud. You can bring out your full potential.
Cloud-Native Security State Report
Lecture materials
[ZDNet Japan Security Trend 2020 Winter Presentation Material] Security that follows high-speed application development in the DX era3.45MB/36P PDF
Nowadays, digitalization is essential for companies to grow their businesses, and many development departments and DX departments are building modern development environments using container technology and working on quick application development. However, while rapid application development greatly contributes to early business value creation, the priority of security tends to be relatively low. We believe that cooperation is important. In this document, we will explain the elements of security for the efforts of development departments using container environments, the differences from conventional security, the concept of countermeasures, the aspects of tools, operations, and culture.
ZDNet Japan Security Trend 2020 Winter Presentation Material
[Developers Summit Summer 2020 Lecture Material] Let's implement "security" in a container-based development pipeline3.48MB /46P PDF
Application development using container technologies such as Docker and Kubernetes is rapidly spreading, but one of the major challenges is how to implement security without sacrificing speed or productivity. In this session, we will introduce the method of implementing security for container-based development pipelines by skillfully combining multiple global standard tools with demonstrations.
Developers Summit Summer 2020 Lecture Materials
User case
Minna Bank, Ltd. Ltd.2.00MB/2P PDF
Minna no Bank, the first bank in the industry to build a full cloud banking system
Adopt Prisma Cloud for cloud security solution
Minna Bank, Ltd.
JCB Co. , Ltd.1.66MB/2P PDF
JCB builds a next-generation platform based on Microservices architecture
Deployed Prisma Cloud to monitor and protect container workloads
Chatwork Co., Ltd.
Chatwork Co., Ltd. Inc.759KB/2P PDF
When Kubernetes was introduced and it became possible to operate individual applications, the operation policy was changed in the direction of strengthening the authority of developers. For that reason, we introduced an open source container monitoring tool and checked it. Although it was possible to detect anomalous events, it was a major issue that they were not able to block them. Therefore, when looking for an all-in-one container security product, I noticed the function of Twistlock (currently Prisma Cloud).
Chatwork Co., Ltd.

application form