Oops, event has ended... But we still have something interesting!
Can you allow containerized applications to securely access sensitive databases? Absolutely, in fact, it’s easier than you might think. In this hands-on virtual workshop, technical experts from Red Hat and CyberArk will show you how you can leverage CyberArk’s out of the box integrations with Red Hat OpenShift to ensure applications can securely access sensitive resources at scale.
Who should attend:
This workshop is intended as a hands on course to explore how to use centralized secrets management to improve the security of applications running on OpenShift which access databases and other sensitive resources.
Application developers
Cloud architects, DevOps administrators
Security professionals with development backgrounds
What you will learn:
Why securing applications matters and how to avoid inadvertent mistakes that could lead to costly security breaches
The benefits of enhancing the native Secrets Management and security capabilities of Red Hat OpenShift, with CyberArk’s certified integrations and centralized approach
How to consistently manage secrets while the enterprise transitions from hybrid to native cloud environments
Practical, step by step, guidance and examples so your team can quickly get started securing secrets in your Red Hat OpenShift platforms
Our Experts:
Important Notice | |
|
|
TIME | SESSION |
---|---|
10:00 - 10:10 | Welcome and Introductions |
10:10 - 10:30 | Overview1 |
10:30 - 10:50 | Overview2 |
10:50 - 11:00 | Q&A |
Location:
Online
Online
,
Date: June 24, 2021
Time: 2:00 PM - 4:30 PM (GMT+02:00) Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
(Registration opens 30 minutes earlier)
If you have any question, send us an email.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed quis ornare erat, sit amet aliquet tortor. Aenean dapibus leo nec commodo blandit. Aliquam erat volutpat. Aenean ac rutrum nisl, non volutpat metus
Cras sed luctus libero. Donec id orci quis justo tincidunt placerat.