Oops, event has ended... But we still have something interesting!
Can you allow containerized applications to securely access sensitive databases? Absolutely, in fact, it’s easier than you might think. In this hands-on virtual workshop, technical experts from Red Hat and CyberArk will show you how you can leverage CyberArk’s out of the box integrations with Red Hat OpenShift to ensure applications can securely access sensitive resources at scale.
Who should attend:
This workshop is intended as a hands on course to explore how to use centralized secrets management to improve the security of applications running on OpenShift which access databases and other sensitive resources.
Cloud architects, DevOps administrators
Security professionals with development backgrounds
What you will learn:
Why securing applications matters and how to avoid inadvertent mistakes that could lead to costly security breaches
The benefits of enhancing the native Secrets Management and security capabilities of Red Hat OpenShift, with CyberArk’s certified integrations and centralized approach
How to consistently manage secrets while the enterprise transitions from hybrid to native cloud environments
Practical, step by step, guidance and examples so your team can quickly get started securing secrets in your Red Hat OpenShift platforms
|10:00 - 10:10||Welcome and Introductions|
|10:10 - 10:30||Overview1|
|10:30 - 10:50||Overview2|
|10:50 - 11:00||Q&A|