
- September 21, 2023
- 10:00 am-11:30 amPST
-  Ivan Sharamok
Event Partner:
Event Partner:
Event Partner:
Are you struggling to secure your containerized workloads?
Perimeter-based network firewalls are not enough to protect microservices running on containers. These workloads are ephemeral, making it difficult to keep track of all of the containers and apply firewall rules to them. Additionally, they often communicate with each other and with resources outside the cluster which requires granular controls at individual workload levels.
In this webinar, we will discuss how Calico Container Firewall can help you secure your containerized workloads.
We will cover the following topics:
Join us for this webinar to learn how to secure your containerized workloads with Calico Container Firewall.
Welcome to an insightful fireside chat bridging technology and finance with real life customer stories. In the financial industry, businesses are adopting a microservices-based cloud-native architecture to enhance efficiency, save costs, and improve customer experience.
However, cloud-native applications running on containers and Kubernetes present technical hurdles: network vulnerabilities, data breaches, service disruptions, and compliance complexities. Addressing these challenges is vital for trust and risk mitigation for financial institutions.
Today, Calico is the most adopted Kubernetes network security solution in financial services, including 3 of the top 5 credit card companies, 3 of the top 5 global banks and many more.
Join Pervez Sikora, Chief Customer Officer, as he shares real-world customer stories in this fireside chat. Learn how Kubernetes network security bolsters compliance and security. Dive into challenges, solutions, and tangible benefits.
This chat is ideal for DevOps, Platform, and security teams shaping secure Kubernetes apps.
Are you leveraging the power of Azure AKS to optimize your Kubernetes workloads in the cloud? Join us for a dive deep into the realm of networking in AKS, empowering you to make informed choices for enhanced performance and scalability.
In Kubernetes, the Container Networking Interface (CNI) via Container Runtime Interface (CRI) delegates network capabilities. AKS offers multiple networking configurations to set up networking in your cluster, including:
During the webinar, we will weigh the pros and cons of each networking option, ensuring you gain the knowledge needed to select the most suitable one based on your unique requirements.
Don’t miss this opportunity to optimize your AKS networking strategy. Register now and join Reza and Krishna as they share the invaluable insights and recommendations to select the right networking option for your Kubernetes workloads.
Event Partner:
Discover the key strategies to fortify the security of your Amazon EKS cluster and protect it from potential breaches. Join Gokhul Srinivasan, Senior Partner Solution Architect at Amazon AWS, and Dhiraj, Director of Technical Marketing, in this engaging webinar. By prioritizing prevention and mitigation over detection and remediation, you can establish a robust runtime security posture for your microservice-based application.
During this webinar, we will delve into the limitations of traditional runtime threat defense solutions and explore more effective alternatives. Gain insights into the following essential topics:
Don’t miss out on this opportunity to enhance your Amazon EKS cluster security.
Register now.
Event Partner:
Imagine having the ability to identify software supply chain threats and assign a score to determine their severity. Now, the question arises: what do we do with these invaluable results?
Join us as we delve into the practical applications of image scan results, empowering you to add an extra layer of protection during the critical deploy time in your application deployment lifecycles.
Key Webinar Highlights:
Register now to secure your spot and equip yourself with the knowledge to protect your environments from potential threats.
Picture this: your application in a Kubernetes environment is under constant threat from external sources launching devastating DDoS attacks. The moment a service is exposed to the Internet, your vulnerabilities become prime targets. But that’s not all. What if attackers breach your Kubernetes cluster, aiming to infect multiple workloads with malware, escalating the impact of their malicious intent?
It’s time to take control and fortify your defenses!
Join us as we guide you through a step-by-step process to combat DDoS attacks head-on.
Key Webinar Highlights:
Register now to secure your spot in this must-attend event and equip yourself with the knowledge and tools to defend your applications against the ever-present threat of DDoS attacks.
Join us to learn how you can effectively secure your Kubernetes workloads using DNS policies. By default, Kubernetes allows unrestricted communication between workloads and external resources within a cluster. However, as IP addresses change and application developers and DevOps teams strive to connect and safeguard their workloads, the need for application-level security arises.
Unfortunately, Kubernetes lacks native support for defining security policies based on DNS names to protect this crucial communication. But fear not! We have the solution.
In this webinar, we will guide you through a step-by-step process to implement DNS policies, allowing you to manage the egress access of your Kubernetes workloads to external resources. Whether you need to connect with SaaS services or legacy workloads outside the cluster, DNS policies provide an effective method to enhance security.
Key Highlights:
Don’t miss this opportunity to master the art of securing your Kubernetes workloads. Register now and unlock the potential of DNS policies in safeguarding your applications.
In Kubernetes clusters, the Domain Name System (DNS) plays a crucial role in enabling service discovery for pods to locate and communicate with other services within the cluster. DNS infrastructure misconfigurations, failures or performance degradation can lead to application latency, transaction timeouts, or poor end-user experience. As these issues are sporadic, making it difficult to diagnose and resolve, resulting in prolonged downtime and frustration for application and DevOps teams.
In this webinar, we will explore how you can quickly troubleshoot the following common DNS scenarios:
Most organizations that move to microservices and Kubernetes based applications still operate in a hybrid environment where legacy applications still reside on-prem or in cloud. These applications rely on perimeter-based NGFW such as Fortinet’s FortiGate with appropriate rules to govern traffic flows. Calico can integrate Kubernetes environments with these firewalls to enable similar workflows and security zones so that operators can use the firewalls in a Kubernetes environment. In this webinar, we will discuss the following:
As more organizations adopt Kubernetes for their production workloads, ensuring the security and privacy of data in transit has become increasingly critical. Encrypting traffic within a Kubernetes cluster is one of the most effective components in a multi-layered defence when protecting sensitive data from interception and unauthorized access. In this webinar, we will explore why encrypting traffic in Kubernetes is important and how it addresses compliance needs with: