
- January 24, 2023
- 10:00 am-11:00 amPDT
In this EKS-focused security workshop, you will work with Calico and AWS experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment. The workshop will guide you in implementing:
We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.
Register now to reserve your spot!
In this AKS-focused security workshop, you will work with Microsoft Azure and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks, including but not limited to PCI, SOC 2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment. The workshop will guide you in implementing:
We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.
Register now to reserve your spot!
Event Partner:Â
Over the last several quarters, our research and development team invested time to create a transformational technology that provides comprehensive runtime protection from both network and container threats. This is an operationally simpler approach without the need to write complex security rules, enabling security teams to focus on essential tasks. Join us for this webinar where we unveil Calico Runtime Threat Defense capability, including
Attend this in-depth, hands-on, AKS-focused security workshop with Microsoft Azure and Calico experts to learn how to prevent, detect, and stop breaches in applications running on AKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. You will leave this workshop with hands-on experience on how to:
We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.
Register now to reserve your spot!
In this AKS-focused security workshop, you will work with Calico and Microsoft Azure experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment. The workshop will guide you in implementing:
We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.
Register now to reserve your spot!
Enterprises are successfully implementing a hybrid-cloud strategy by leveraging OpenShift for containers and Kubernetes. OpenShift platform owners need to observe and secure workload communication in their environment against malicious activity, and have controls in place to actively mitigate any associated security and compliance risk across clusters.
In this webinar, Red Hat and Tigera experts will discuss how OpenShift users can implement enterprise-level network security for workloads to secure communication and mitigate security risk during runtime.
In this EKS-focused security workshop, you will work with AWS Dev Days and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks, including but not limited to PCI, SOC 2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment. The workshop will guide you in implementing:
We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.
Register now to reserve your spot!
Amazon EKS ensures a secure, scalable, and managed Kubernetes environment with security patches automatically applied to your cluster’s control plane. However, containerized workloads running in EKS are still at risk of potential security threats and vulnerabilities in your AWS environment. Therefore, users need to deploy container security, runtime threat defense, and observability and troubleshooting capabilities to handle new vulnerabilities and risks at the workload level in Amazon EKS.
In this AWS and Tigera webinar, learn about seven security best practices used by Amazon EKS users to secure containerized workloads in EKS.
Attend this in-depth, hands-on, AKS-focused security workshop with Microsoft Azure and Calico experts to learn how to prevent, detect, and stop breaches in applications running on AKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. You will leave this workshop with hands-on experience on how to:
We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.
Register now to reserve your spot!
Attend this in-depth, hands-on security workshop with Calico and AWS Dev Days experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. This workshop is designed to provide hands-on experience for you to:
We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.
Register now to reserve your spot!