Starting March 2021 the Red Hat Security Ecosystem team is happy to announce our monthly OpenShift series, “DevSecOps is the Way” In this series you will learn how Red Hat weaves together DevOps and Security to master the force called DevSecOps. We explain how to assemble Red Hat products and our security ecosystem partners to aid in your journey to master deploying a comprehensive DevSecOps solution.
Every month we present a different security topic and use cases. Topics are aligned with products and technologies from Red Hat and our software partners (ISVs). Our series brings in industry experts to discuss how to weave together culture, process, and technology.
Every month you can look forward to:
- Two (2) different OpenShift TV Shows : Wed, 1pm Eastern and Thursday, 2pm Eastern
- Three (3) different podcasts featuring ecosystem partners and industry experts. Have a listen to our first podcast introducing this series; with Aaron Levey and Dave Meurer
- OpenShift Commons Briefing hours featuring a Red Hat Security Partner (3rd Wednesday of each month)
- Various content, like blogs and whitepapers to support each month’s topic.
Mark your calendar for the 3rd week of each month with the following lineup:
Vulnerability Scanning: Identifying vulnerabilities in 3rd party dependencies in applications and containers. |
|
Compliance: Audit and controls of industry and government regulations and corporate policies. |
|
Identity & Access Management: Control access to on-premises and cloud assets, applications, and data based on user or application identity and administratively defined policies. |
|
Application Analysis: Identify vulnerabilities in applications, images and configurations early in the life cycle. |
|
Data Controls: Help protect data integrity and prevent unauthorized data disclosure for data at rest and in motion.. |
|
Network Controls: Segmentation methods that let you control, segregate, and visualize Kubernetes traffic to isolate tenants and secure communications flows between containerized applications and microservices. |
|
Runtime Analysis: Help maintain cluster hygiene by identifying and mitigating suspicious and malicious activity in real-time. |
|
Audit & Monitoring: Centralize logs and provide intelligence about security incidents in your production environment. |
|
Remediation: Automatically take corrective actions when security incidents occur in production. |
|
Platform Security: Foundational features for securing the underlying container host as well the container platform. |
Our first March OpenShift TV show episode is on the new Red Hat Vulnerability Scanner Certification. Experts from Red Hat and IBM’s X-Force discuss how vulnerability scanning impacts real world customers. Catch the replay at this link:
Presenters:
- Steve Ocepek, IBM X-Force Red
- Jeremy West, Manager, Red Hat Product Security Engineering
- Dave Meurer, Principal Solution Architect, Red Hat Global Security ISVs
We are excited to provide all this great Security content to you each month. Please check our web site often. We will update it with links to past and future content.
Bring your light saber and be ready to train hard... may the DevSecOps be with you!
Über den Autor
Dave Meurer currently serves as a Principal Solution Architect on the Red Hat Global Partner Security ISV team, where he owns technical relationships and evangelism with security independent software vendor partners of Red Hat. Before joining Red Hat, he spent nine years in the Application Security industry with Synopsys and Black Duck, where he served in similar roles as the director of technical alliances and sales engineering.
Meurer also worked for Skyway Software, HSN.com, and Accenture in various management and application development roles. When he’s not thinking about Kubernetes, security, and partners, he enjoys being the VP Sales of North Central Tampa for his wife (the CEO) and 5 kids (Inside Sales).
Nach Thema durchsuchen
Automatisierung
Das Neueste zum Thema IT-Automatisierung für Technologien, Teams und Umgebungen
Künstliche Intelligenz
Erfahren Sie das Neueste von den Plattformen, die es Kunden ermöglichen, KI-Workloads beliebig auszuführen
Open Hybrid Cloud
Erfahren Sie, wie wir eine flexiblere Zukunft mit Hybrid Clouds schaffen.
Sicherheit
Erfahren Sie, wie wir Risiken in verschiedenen Umgebungen und Technologien reduzieren
Edge Computing
Erfahren Sie das Neueste von den Plattformen, die die Operations am Edge vereinfachen
Infrastruktur
Erfahren Sie das Neueste von der weltweit führenden Linux-Plattform für Unternehmen
Anwendungen
Entdecken Sie unsere Lösungen für komplexe Herausforderungen bei Anwendungen
Original Shows
Interessantes von den Experten, die die Technologien in Unternehmen mitgestalten
Produkte
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Cloud-Services
- Alle Produkte anzeigen
Tools
- Training & Zertifizierung
- Eigenes Konto
- Kundensupport
- Für Entwickler
- Partner finden
- Red Hat Ecosystem Catalog
- Mehrwert von Red Hat berechnen
- Dokumentation
Testen, kaufen und verkaufen
Kommunizieren
Über Red Hat
Als weltweit größter Anbieter von Open-Source-Software-Lösungen für Unternehmen stellen wir Linux-, Cloud-, Container- und Kubernetes-Technologien bereit. Wir bieten robuste Lösungen, die es Unternehmen erleichtern, plattform- und umgebungsübergreifend zu arbeiten – vom Rechenzentrum bis zum Netzwerkrand.
Wählen Sie eine Sprache
Red Hat legal and privacy links
- Über Red Hat
- Jobs bei Red Hat
- Veranstaltungen
- Standorte
- Red Hat kontaktieren
- Red Hat Blog
- Diversität, Gleichberechtigung und Inklusion
- Cool Stuff Store
- Red Hat Summit