Rarely does middleware security enter the conversation, but it should.
Identity management is a complex area. Doing it wrong could lead to constant problems, outages, and a resource drain.
Identity management and authentication are core elements of the security fabric that connects all layers of the modern enterprise.
Red Hat® Satellite was introduced in 2002 as a means to patch and provision systems and to build standard operating environments. While this is still a primary focus, the requirements for systems management are evolving and growing increasingly complex.
There’s a lot going on in the cloud, and a lot of that is open source. Microsoft and Red Hat are bringing a wave of modern open source portfolios to the cloud. Fueled by the cloud, DevOps is becoming commonplace across organizations of all sizes.
In this session, we'll will cover the state of the art of docker container security. We'll also take a look at the future of container security. You'll learn:
-When you should use containers versus virtual machines
-What platform you should run your containers on
Docker made it simple to run a single process in a Linux container. We often have quick success getting something like Apache or MySQL running in a docker container, especially if it's part of an application being built from scratch.