Recent public breaches highlight the importance of strategic security that extends beyond the network perimeter. Applications developed and maintained without security in mind present a likely entry point for malicious attackers. Preventative steps should be taken to reduce vulnerabilities that can avoid zero-day attacks.
As organizations adopt containers, an automated approach to security, testing, and application development is needed to increase productivity and reduce risk.
In this session, you'll learn how OpenShift by Red Hat® can be used to:
- Create an automated CI/CD pipeline for any application that monitors vulnerabilities in any open source products or component libraries
- Use that security monitoring to reduce waste and risk while increasing productivity and innovation
- Enhance open-source library security and establish a security-first mindset for application development
- Emily Brand, territory services manager, Red Hat
- Justin Goldsmith, senior consultant, Red Hat
- Nick Balkissoon, consultant, Red Hat
Date: April 14, 2016
Time: 12 p.m. ET
Length: 1 hour
Audience: Business and Technical