Tigera Events

Extending OpenShift Security and Observability with Calico

Topics:

OpenShift Security
Americas
January 31, 2023
10:00 am PDT

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • PARTNER

  • TOPIC

In this EKS-focused security workshop, you will work with Calico and AWS experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment. The workshop will guide you in implementing:

  • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
  • Extend firewall protection at the granular, workload level
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Dhiraj Sehgal

In this AKS-focused security workshop, you will work with Microsoft Azure and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks, including but not limited to PCI, SOC 2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment. The workshop will guide you in implementing:

  • Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Evidence and audit reporting

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Dhiraj Sehgal

Event Partner: 

Over the last several quarters, our research and development team invested time to create a transformational technology that provides comprehensive runtime protection from both network and container threats. This is an operationally simpler approach without the need to write complex security rules, enabling security teams to focus on essential tasks. Join us for this webinar where we unveil Calico Runtime Threat Defense capability, including

  • Our comprehensive runtime protection for container workloads
  • A practical and straightforward solution for detecting container and network-based threats
  • Active risk mitigation to prevent breaches from turning into disasters
  •  Giri Radhakrishnan

Attend this in-depth, hands-on, AKS-focused security workshop with Microsoft Azure and Calico experts to learn how to prevent, detect, and stop breaches in applications running on AKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. You will leave this workshop with hands-on experience on how to:

  • Scan container images and block deployment based on your security criteria during build time
  • Preview and enforce security policies to protect vulnerable workloads
  • Implement zero-trust access controls to prevent egress and lateral movement during runtime
  • Implement runtime security with IDS/IPS, WAF, and malware detection
  • Get visibility into Kubernetes cluster traffic to troubleshoot and improve security

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Jeremy Guerrand

In this AKS-focused security workshop, you will work with Calico and Microsoft Azure experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment. The workshop will guide you in implementing:

  • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
  • Extend firewall protection at the granular, workload level
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Regis Martins

Enterprises are successfully implementing a hybrid-cloud strategy by leveraging OpenShift for containers and Kubernetes. OpenShift platform owners need to observe and secure workload communication in their environment against malicious activity, and have controls in place to actively mitigate any associated security and compliance risk across clusters.

In this webinar, Red Hat and Tigera experts will discuss how OpenShift users can implement enterprise-level network security for workloads to secure communication and mitigate security risk during runtime.

 

In this EKS-focused security workshop, you will work with AWS Dev Days and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks, including but not limited to PCI, SOC 2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment. The workshop will guide you in implementing:

  • Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Evidence and audit reporting

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Amazon EKS ensures a secure, scalable, and managed Kubernetes environment with security patches automatically applied to your cluster’s control plane. However, containerized workloads running in EKS are still at risk of potential security threats and vulnerabilities in your AWS environment. Therefore, users need to deploy container security, runtime threat defense, and observability and troubleshooting capabilities to handle new vulnerabilities and risks at the workload level in Amazon EKS.

In this AWS and Tigera webinar, learn about seven security best practices used by Amazon EKS users to secure containerized workloads in EKS.

Attend this in-depth, hands-on, AKS-focused security workshop with Microsoft Azure and Calico experts to learn how to prevent, detect, and stop breaches in applications running on AKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. You will leave this workshop with hands-on experience on how to:

  • Scan container images and block deployment based on your security criteria during build time
  • Preview and enforce security policies to protect vulnerable workloads
  • Implement zero-trust access controls to prevent egress and lateral movement during runtime
  • Implement runtime security with IDS/IPS, WAF, and malware detection
  • Get visibility into Kubernetes cluster traffic to troubleshoot and improve security

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Attend this in-depth, hands-on security workshop with Calico and AWS Dev Days experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. This workshop is designed to provide hands-on experience for you to:

  • View service-to-service communication to assess security risk from external threats
  • Analyze and fix security policy gaps within the cluster
  • Detect and prevent anomalous behaviors such as attempts to access restricted URLs
  • Implement security policies in runtime to mitigate risk based on vulnerabilities found in build time

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!