Log in / Register Account


Approaching security and compliance with Red Hat OpenShift 4

Watch recording from November 6, 2019

Containers have become a compelling technology for realizing the full potential of agile, DevOps, and GitOps. Enterprises are increasingly using container application platforms to deliver workloads in support of different business capabilities. The speed with which applications can be deployed, modified, and managed presents security challenges and increased attack vectors from internal and external actors. Enterprises and agencies must try to secure their containers, orchestration platforms, and underlying infrastructure to guard against these threats.

Fortunately, there are processes, procedures, and technologies that can add security to Red Hat® OpenShift® 4, its underlying platform, and container workloads running on top of it. In this session, we’ll discuss security for the platform and the deployed containers. We’ll cover:

  • Security concerns.
  • Compliance issues.
  • Layers of security.
  • Hardening approaches.


Live event date: Wednesday, November, 6, 2019 | 2 p.m. ET

On-demand event: Available for one year afterward.

Khary Mendez

Principal Consultant, Red Hat

Khary Mendez is a Principal Consultant at Red Hat with more than 20 years of experience in developing software solutions and driving organizational change. A Red Hat Certified Architect, he also has extensive experience teaching, mentoring, and rapidly getting individuals and organizations up to speed on newer technologies and methodologies. Khary is passionate about transferring knowledge and addressing all client concerns in an open manner.

Greg Tinsley

Senior Consultant, Red Hat

Greg Tinsley is a Senior Consultant at Red Hat who specializes in middleware and integration technologies. A Red Hat Certified Architect, he has worked extensively for the last 20 years in the transportation and financial sectors, designing, creating, and implementing software solutions for clients.