Can you allow containerized applications to securely access sensitive databases? Absolutely, in fact, it’s easier than you might think. In this hands-on virtual workshop, technical experts from Red Hat and CyberArk will show you how you can leverage CyberArk’s out of the box integrations with Red Hat OpenShift to ensure applications can securely access sensitive resources at scale.
Who should attend:
This workshop is intended as a hands on course to explore how to use centralized secrets management to improve the security of applications running on OpenShift which access databases and other sensitive resources.
Application developers
Cloud architects, DevOps administrators
Security professionals with development backgrounds
What you will learn:
Why securing applications matters and how to avoid inadvertent mistakes that could lead to costly security breaches
The benefits of enhancing the native Secrets Management and security capabilities of Red Hat OpenShift, with CyberArk’s certified integrations and centralized approach
How to consistently manage secrets while the enterprise transitions from hybrid to native cloud environments
Practical, step by step, guidance and examples so your team can quickly get started securing secrets in your Red Hat OpenShift platforms
You’ll also gain hands-on experience using the Conjur Open Source secrets management platform.
Event details:
Date: Thursday, August 12, 2021
Time: 11:00am PST
Duration: 2.5 hours
Instructor name(s), titles: Jody Hunt, Strategic Solutions Engineer, CyberArk
Important Notice | |
|
|
TIME | SESSION |
---|---|
10:00 - 10:10 | Welcome and Introductions |
10:10 - 10:30 | Overview1 |
10:30 - 10:50 | Overview2 |
10:50 - 11:00 | Q&A |
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed quis ornare erat, sit amet aliquet tortor. Aenean dapibus leo nec commodo blandit. Aliquam erat volutpat. Aenean ac rutrum nisl, non volutpat metus
Cras sed luctus libero. Donec id orci quis justo tincidunt placerat.