- 10:00 am-11:00 amPDT
-  Giri Radhakrishnan
The MITRE ATT&CK framework for containers and networks provides common tactics used by attackers to breach containerized applications on Kubernetes. Attend this webinar to learn how Calico’s defense-in-depth approach protects against container and network-based MITRE ATT&CK techniques. In this webinar, you will discover:
As Kubernetes clusters grow, platform owners want to have visibility into workload-workload communication in the cluster to be able to troubleshoot workload communication breakdown. They also want to know about security policy gaps and applying policies to secure the communication. Using a real-life scenario, in this session we will learn:
Most businesses are subject to corporate and/or regulatory compliance requirements. From an operational perspective, this may involve isolating workloads containing sensitive data or restricting who is allowed to access specific resources. In this session, you will learn how to use Calico’s identity-aware microsegmentation to meet compliance mandates for SOC 2, PCI, HIPAA, etc., in any Kubernetes environment.
Were you aware of the dirty pipe or text4shell vulnerabilities last year? With all the security predictions and trends that are forecast for this year, you can easily get overwhelmed by the need to invest in a broad range of security solutions. It is wise to carefully plan and evaluate which tools to invest in, especially if you are dealing with a new domain such as containers and Kubernetes.
In this webinar we will walk you through the container threat landscape and why there is a need for a new approach to container security.
This webinar will cover topics about:
Kubernetes platform teams create and maintain a secure Kubernetes platform so developers can focus on building applications. Calico provides zero-trust security to enable platform engineers to reduce the attack surface of microservices-based applications and mitigate security breaches. In this webinar, you will learn how to use the following Calico features to implement Kubernetes platform security best practices:
Another release, another milestone. With Calico’s latest release (3.16), we have some exciting announcements for AKS and EKS users. If you are managing Kubernetes clusters on Azure AKS or AWS EKS and wondering how to secure traffic leaving the cluster, join this webinar where we will discuss how teams can:
In this session, we will briefly go over Kubernetes components and their roles. Then, we will delve into the realm of security and examine how the default configurations of these components could be used to attack your environment and how a zero-trust posture can help against the attacks that are targeting your clusters. By the end of this session, attendees will be able to:
Are you on your cloud-native journey and wondering how organizations have managed to create a secure Kubernetes platform for application workloads? If you are using a managed Kubernetes service such as AKS or EKS, or self-managed platforms such as Red Hat OpenShift or Rancher, and want to know more about workload access controls and other security best practices for zero-trust, attend this webinar. You will learn:
Organizations are adopting multi-region databases such as CockroachDB for various reasons, including disaster recovery, regional data protection regulations or latency reduction. Unfortunately, Kubernetes’s single cluster architecture doesn’t scale with multi-region and multi-cluster database deployments. Calico cluster mesh addresses this Kubernetes shortcoming by providing consistent networking and security policies for CockroachDB and similar architecture databases and prevents drift for multi-region CockroachDB in Kubernetes.
Join Cockroach Labs and Calico experts in this webinar to see a working solution to address networking and security across clusters in different regions.
Over the last several quarters, our research and development team invested time to create a transformational technology that provides comprehensive runtime protection from both network and container threats. This is an operationally simpler approach without the need to write complex security rules, enabling security teams to focus on essential tasks. Join us for this webinar where we unveil Calico Runtime Threat Defense capability, including