Tigera Events

New Product Launch: Security for Cloud-native Applications

Topics:

Observability Security
Americas EMEA
February 10, 2022
10:00 am PST

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • TOPIC

In this AKS-focused workshop about container and Kubernetes security and observability, you will work with Microsoft and Calico experts to learn how to design, deploy, and observe container and cloud-native networking security in an AKS or Microsoft Azure environment. This 90-minute hands-on lab with your own provisioned AKS and Calico Cloud environment is designed to provide more complete knowledge on how to implement:

  • Image assurance and configuration assessment
  • Pod-based, zero-trust workload access controls and DNS as a policy
  • Live troubleshooting with Dynamic Service Graph and Dynamic Packet Capture
  • Compliance, evidence, and audit reporting (PCI, SOC 2, and CIS benchmarks)

You will come away from this workshop with an understanding of how others in your industry are securing and observing containers and cloud-native networks in Microsoft AKS, along with best practices that you can implement in your own organization.

We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

Register now to reserve your spot!

    In this EKS-focused workshop about cloud-native application security and observability, you will work with a Calico and AWS expert to learn how to design, deploy, and observe container security, cloud-native network security, and compliance in an EKS environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

    • Zero-trust workload access controls and DNS as a policy
    • Image assurance and configuration assessment
    • Compliance, evidence, and audit reporting
    • Live visualization with Dynamic Service Graph
    • UI-driven troubleshooting with Dynamic Packet Capture

    You will come away from this workshop with an understanding of how others in your industry are securing and observing containers and cloud-native networks in AWS EKS, along with best practices that you can implement in your own organization.

    We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

    Register now to reserve your spot!

      As more organizations adopt microservices based architecture runnning on containers for their cloud-native application, it expands the attack surface at build, deploy and run time. A security approach that only relies on detecting image vulnerabilities and misconfigurations is not enough to secure the application. Security, DevOps, SREs, DevSecOps and platform owners not only need the ability to observe, monitor not only these containers for malicious activity at build time but also require runtime security for the application. In this webinar, you will learn how enterprises address both container and cloud-native network security for build, deploy and run-time.

      • Image assurance
      • Configuration assessment
      • Zero Trust workload access controls
      • Identity-aware microsegmentation

      Join us for 45 mins to learn about how Calico can help you do container security and cloud-native network security as a single workflow.

        We are immensely proud to introduce our newest capabilities to secure cloud-native applications.

        We’ve spent a lot of time listening to you, our community and customers, to better understand what you need to secure, observe, and troubleshoot your cloud-native applications.

        Join us for an exciting launch event hosted by our President & CEO Ratan Tipirneni and our VP Business Development & Product Management, Amit Gupta, to learn more about our newest features and capabilities.

          In this AKS-focused workshop about container and Kubernetes security and observability, you will work with Microsoft and Calico experts to learn how to design, deploy, and observe container and cloud-native networking security in an AKS or Microsoft Azure environment. This 90-minute hands-on lab with your own provisioned AKS and Calico Cloud environment is designed to provide more complete knowledge on how to implement:

          • Image assurance and configuration assessment
          • Pod-based, zero-trust workload access controls and DNS as a policy
          • Live troubleshooting with Dynamic Service Graph and Dynamic Packet Capture
          • Compliance, evidence, and audit reporting (PCI, SOC 2, and CIS benchmarks)


          You will come away from this workshop with an understanding of how others in your industry are securing and observing containers and cloud-native networks in Microsoft AKS, along with best practices that you can implement in your own organization.

          We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

          Register now to reserve your spot!

            Cloud-native applications take full advantage of the distributed, scalable, flexible nature of the public cloud deployments thus generate a significantly greater percentage of east-west traffic. This shift has created a larger attack surface area and greater potential for free lateral movement within these application infrastructures. Microsegmentation allows security, platform owners, and networking professional to create secure “islands” within their distributed infrastructure and control access to those islands for all types of users, whether they are outsiders, customers, or employees logging in from various locations. It is central to implementing a zero trust security model for cloud-native applications.

            In this webinar, we will talk about how Calico’s common segmentation model and unified policy framework works across all environments, including any combination of cloud and hybrid providers, cloud instances, Kubernetes distributions, and containers.

              In this RKE-focused workshop for networking, security, and observability on containers, Kubernetes, and Calico, you will work with a Calico and RKE expert to learn how to design, deploy, and observe security and networking policies in an RKE environment. This 90-minute hands-on lab comes with your own provisioned Calico Cloud environment, designed to provide more complete knowledge on how to implement:

              • Workload access controls
              • Compliance and reporting
              • Run-time visualization of traffic flow and security policies
              • Service-level observability
              • Anomaly detection and live troubleshooting

              You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes, container and cloud security, and observability in RKE, and how you can implement it in your own organization.

              We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

                In this RKE-focused workshop for networking, security, and observability on containers, Kubernetes, and Calico, you will work with a Calico and RKE expert to learn how to design, deploy, and observe security and networking policies in an RKE environment.

                This 90-minute hands-on lab comes with your own provisioned Calico Cloud environment, designed to provide more complete knowledge on how to implement:

                • Workload access controls
                • Compliance and reporting
                • Run-time visualization of traffic flow and security policies
                • Service-level observability
                • Anomaly detection and live troubleshooting

                You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes, container and cloud security, and observability in RKE, and how you can implement it in your own organization.

                We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

                  In this EKS-focused workshop for Kubernetes security and observability by AWS and Tigera, you will work with a Calico and AWS expert to learn how to design, deploy, and observe security and networking policies in an EKS environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

                  • Access controls
                  • DNS policy
                  • Dynamic Service Graph
                  • Compliance and reporting
                  • Observability and troubleshooting

                  You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes security and observability in AWS EKS, and with best practices that you can implement in your own organization.

                  We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

                  Register now to reserve your spot!

                    Traditional firewalls are inadequate to protect containerized workloads as they require a static source and destination IP address. Furthermore, containers have short-lived, ephemeral IPs that can’t be used in firewall rules.

                    Calico’s cloud-native application firewall protects containerized workloads at a granular container level from network-based external threats and lateral movement. With support for both north-south and east-west protection, Calico’s firewall prevents malicious actors from gaining a foothold and moving laterally across Kubernetes clusters.

                    Attend this webinar to learn how Calico’s Cloud-Native application firewall provides

                    • Enforcement of security policies at a granular container level
                    • Intrusion detection and prevention
                    • Deep packet inspection
                    • Protection from DDoS attacks
                    • Support for multi-cluster, multi-cloud and hybrid environments