 Hey everybody, I'm Mike Foster. I'm the community lead at Stack Rocks, and I'm joined by Doran, who's the PM at for Red Hat Advanced Cluster Security. Quick show of hands. Who here has heard about Stack Rocks? That's awesome. I love to hear that. Stack Rocks obviously recently rebranded to Red Hat Advanced Cluster Security after the Red Hat purchase in 2021. It's been a fun two years. We have some cool announcements we want to share with you and I'm just going to go through the agenda real quick. Quick update, obviously. I'm not going to ramble about security and Kubernetes. We're going to get into the product where it's at a little bit of the mission as well as the roadmap. I'm going to introduce you to the new ACS Cloud Service. Doran's been working on this tirelessly and it's been really awesome to see a little bit of the Stack Rocks vision come to life in the last year. And then again how to get started and what's next for us a little bit of a roadmap. Any questions? I think we keep it to at lunch. We'll be over there. Come meet us after. So, security Kubernetes is always a hot topic. Six door cons kicking it off today too. I think Luke Kynes is here. Again, I think over the last seven years, everybody knows the DevOps movement. Big cultural shift. Really the change of security was always supposed to be a part of that, right? And we need our tools to actually enable developer growth to work with the speed of the development of containers. And that's what Stack Rocks and the Kubernetes native security application was designed to do. And for delivering business value, this is supposed to come with a huge list of notes. I'm not going to ramble about it, but in terms of the mission of Stack Rocks, really we want a faster time to resolution. We want to build those security policies early in the CICD process with notifications that developers know how to remediate their fixes. And we want to cut that on noise. We want to bridge that skill gap. So, I mean, I'm sure some security teams getting into Kubernetes, it's a little overwhelming. We want to make sure that they have the right context, that developers, operations, and security teams can share information easily. And hopefully asynchronously, if we can automate things. And then we want to break across functional barriers, provide guidance, enable collaboration in a way that we can do it all declaratively. So, again, security programs are successful when they deliver these key attributes. So, where does ACS fit in? For those, I mean, that's kind of nice that everybody knows about it, so I'll keep it brief. But we really excel in vulnerability management and pairing that with that Kubernetes-rich data of the configuration. All the different manifests to give you a more in-depth look at the risk in your cluster for your applications. We obviously use Kubernetes native controls, things like network policies for network segmentation. We generate those network policies as well to help out. And then, of course, we have remediation to help you meet compliance standards and an EBPF module as well for detection and runtime response. And it really is an awesome platform if you guys want to check it out. And then I'll hand it off to, oh, I got one more slide before Duran takes over. But again, we were the first Kubernetes native security platform. I'd like to point that out, the first in 2017 to really break out and take that title. And again, it's about building those policies and you'll be able to deploy and run infrastructure, doing it as, like, shift left as possible if I'm going to use the marketing term. And now Duran's going to take you through a little bit of what we've done over the last two years since the acquisition. Yeah, so what we've done in the last two years, Red Hat bought a StackWox and invest a lot of effort and resource in ramping a StackWox to be ACS. But in this situation today, we introduced a new dashboard that you can all see in our latest version. We create security and alert workflows for teams to use namespace and namespace annotation. And we add, I will not go over all the features, but we introduce a lot of new features and also integrate with the Stack with Red Hat in general. We integrate with Rail 9 and version 7.2. We introduce a lot of integration with our compliance framework, with compliance operator. And we also supporting all the cloud implementation of OpenShift today, including Rosa and Arrow. And we open sourced as well. We actually in there too. We open sourced. So we got to keep the StackWox name alive as open source StackWox. And now we have an even bigger announcement as well too. So for the last year, we're working on making ACS as a cloud service as a SaaS offering that allow customers to have a quick time to value. So you don't need to install central. You don't install the main components. You don't need to maintain it. We will maintain it for you in the cloud. And we also introduce, we will introduce a better way to, easy way to purchase it and use a regular cloud way of consuming services. And we will provide the full support, 24-7 support and SRE support on the background. And we also, if you run, you will be able to secure any Kubernetes cluster. And we face ACS today. But using cloud services will make it easier for customers to use and secure EKS, AKS and GKE. Some additional information. So again, we are launching first on AWS. But basically we will expand to the rest of the clouds. But you base ACS capabilities with cloud native and with Kubernetes native so you can support with any Kubernetes deployment and secure any Kubernetes deployment. And if you want to manage it yourself and use that operator, that's always your choice too. If you want to sign up, so we're releasing this as a service preview to start. We're looking for customer feedback, seeing what our customers need. So if you scan the QR code, it will bring you to a page for sign up. Again, there's that service preview process. So you're going to call with me eventually taking down all of your worries and fears and we'll get through it together. So again, scan that QR code. For more of the QR code, we'll pop up at the end as well. And you can always find us for more questions. Dharan, what else am I missing? And yeah, we're looking for customers to sign up for the early access. Use this product fast together. We have white glove services from our team helping you using the product and we're looking for feedback from you and other customers to get our product better and launch the best product as we can during GA. Yeah, and the goal is to start service preview in December as well. So it's coming up pretty fast. And then what's next for ACS specifically? We're working out the roadmap right now. Dharan knows the roadmap way better than I do, so I don't want to take over. But in terms of key priorities for us, always innovating in the security space, there's a lot of moving parts and I'm sure I think Luke's here. There's a lot of talk about security over at KubeCon right now. So security innovation, obviously the cloud service, working with integrating into Red Hat's existing portfolio with things like Quay and the different Clare scanners and things like that. And of course, the Stack Rocks open source project. Send your developers up there. It's really nice to get contributions and we'd love to have you on our community meetings. Dharan, I think you had some notes about some specifics. Yeah, so we run up our vulnerability management. One of the major things is we aligned with, we're working on the line with Clare. So we have one security, one vulnerability management tools for both all our open source or all our Red Hat stack. We enhanced the vulnerability management with a lot of new guidance and presentation and workloads. We had more and more capabilities for dashboarding and presenting capabilities. We launched already the Rail 9 UBI and Rail 9 RPM vulnerability scanning. We introduced the host vulnerability scanning and we will include it. It's already available but we will enhance the capability for developer local image scanning. For the DevOps or SecOps and compliance, we continue with the dashboarding, improving our dashboarding and including trends and history data including introducing a risk indicators that exist today, what we are improving it. We introduce our more capabilities on compliance including EKS compliance, Benchmark CS EKS compliance, and we're going to enhance our compliance experience with major introduction and interaction with the compliance operator already using on OpenShift and we're going to expand it to other platforms. On network security, we are working on moving the network security and policy management to shift left and now allowed DevOps team to create network policies. I was going to say, I'm giving a demo if anybody's at KubeCon on Thursday about this. The MPGuard project is really cool. Creating network policies at the developer level, checking it against some policies that your security teams checked in so that you can do it asynchronously and you don't have the security team coming in after and cramming down network policies on your developers. So it's awesome. The MPGuard project, if anybody wants to look it up or come meet me at the Red Hat booth on Thursday at 10.50. But again, that's a huge one I think for network security because it's a very powerful Kubernetes native tool and we want people to implement it in a way that works for their teams. And yeah, so for community projects, Stacrox project, obviously, Stacrox.io, you can find out all your information there. We use the Clara scanner underneath the hood and so does Quay as well. Falco is a project that we contribute to and we love them. They do some great work. They help with a lot of our runtime scanning and the KubeLinter project. So we can extend some of those checks to the developer. We can do some quick configuration checks against your YAML files to see what's necessarily the most secure. And then lastly, I think, is the final send off before lunch. We'd love you to sign up. Even if you don't necessarily think you're the best use case, sign up. Let us contact you. Let's see what you're working with. And we'd love to even get feedback from you if you're not using it and why you're not using it. So we really appreciate you listening to us. Hope you have a great lunch and enjoy the rest of comments. Thank you for having us.