Containers have become a compelling technology for realizing the full potential of agile, DevOps, and GitOps. Enterprises are increasingly using container application platforms to deliver workloads in support of different business capabilities. The speed with which applications can be deployed, modified, and managed presents security challenges and increased attack vectors from internal and external actors. Enterprises and agencies must try to secure their containers, orchestration platforms, and underlying infrastructure to guard against these threats.
Fortunately, there are processes, procedures, and technologies that can add security to Red Hat® OpenShift® 4, its underlying platform, and container workloads running on top of it. In this session, we’ll discuss security for the platform and the deployed containers. We’ll cover:
- Security concerns.
- Compliance issues.
- Layers of security.
- Hardening approaches.
Live event date: Wednesday, November, 6, 2019 | 2 p.m. ET
On-demand event: Available for one year afterward.
Principal Consultant, Red Hat
Khary Mendez is a Principal Consultant at Red Hat with more than 20 years of experience in developing software solutions and driving organizational change. A Red Hat Certified Architect, he also has extensive experience teaching, mentoring, and rapidly getting individuals and organizations up to speed on newer technologies and methodologies. Khary is passionate about transferring knowledge and addressing all client concerns in an open manner.
Senior Consultant, Red Hat
Greg Tinsley is a Senior Consultant at Red Hat who specializes in middleware and integration technologies. A Red Hat Certified Architect, he has worked extensively for the last 20 years in the transportation and financial sectors, designing, creating, and implementing software solutions for clients.