Webinars

 

 

Upcoming Webinar

Extending Your FortiGate Next-Gen Firewall to Kubernetes

Wednesday, June 17, 2020
10:00 am PT / 1:00 pm ET
Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databases or other resources protected behind firewalls.  Tigera and Fortinet have joined forces to solve this operational challenge. With the combination of FortiGate Next-Gen firewalls and Calico Enterprise, you gain full visibility into the container environment and can define fine-grained policies to determine which Kubernetes workloads are allowed to talk to the enterprise’s crown jewels running outside the Kubernetes cluster. In this webinar, you will learn how Calico Enterprise and FortiGate enables you to:
  • Implement network security control requirements in Kubernetes
  • Dynamically populate Kubernetes objects in FortiGate to enforce security policies
  • Gain deep visibility into network traffic within your Kubernetes clusters.
After this webinar, you’ll also understand why Calico has been chosen as the preferred network security solution by the leading managed Kubernetes services – Amazon EKS, Azure AKS, Google GKE, IBM IKS, and more – as well as powering several of the world’s largest Kubernetes clusters.

Past Webinars

  • Past Webinar

    Kubernetes Security: Detecting Lateral Movement and Defending Against Attackers

  • Past Webinar

    Advanced Kubernetes Network Design

  • Past Webinar

    Detecting Domain Generation Algorithms

  • Past Webinar

    Extending Your Fortinet Next-Generation Firewall to Kubernetes

  • Past Webinar

    K8s Access Controls With Calico Enterprise

  • Past Webinar

    Four Ways to Accelerate Your Kubernetes Project

  • Past Webinar

    5 Ways to Detect Malicious Activity & Protect Kubernetes Workloads

  • Past Webinar

    Kubernetes: Anatomy of the Shopify Attack & How to Defend Your Infrastructure

  • Past Webinar

    Extend Panorama to Kubernetes with Calico Enterprise

  • Past Webinar

    Understanding & Troubleshooting Kubernetes Connectivity Issues

  • Past Webinar

    What’s New in Tigera Calico: An Update on Recent Features & Enhancements

  • Past Webinar

    Why Can’t We Be Friends: Kubernetes in a Zone-Based Architecture World

  • Past Webinar

    Kubernetes & Tigera Calico: Network Policies, Security, and Auditing

  • Past Webinar

    Meeting PCI DSS Network Security Requirements in Kubernetes Environments

  • Past Webinar

    Extend Firewalls to Kubernetes to Stop Breaking Existing Security Architectures

  • Past Webinar

    Securing Kubernetes Applications in Google Cloud with Tigera

  • Past Webinar

    Istio Traffic Management – Best Practices in Secure Kubernetes Environments

  • Past Webinar

    Kubernetes & Zero Trust Security: Supporting a CARTA approach with Anomaly Detection

  • Past Webinar

    Kubernetes & Zero Trust Security: Supporting a CARTA Approach to Continuous Monitoring

  • Past Webinar

    Top Container Security Lessons from Deploying Kubernetes and Red Hat OpenShift

  • Past Webinar

    Network Security and Compliance for Kubernetes on AWS with Atlassian and Tigera

  • Past Webinar

    Zero Trust Security: Supporting a CARTA approach with Network Security

  • Past Webinar

    Kubernetes: Ingress & Egress Traffic Management

  • Past Webinar

    Leveraging Kubernetes Services & DNS

  • Past Webinar

    Istio: Enabling a Defense in Depth Network Security Posture

  • Past Webinar

    Kubernetes: Securing Hybrid and Multi-Cloud Environments

  • Past Webinar

    Enforcing Compliance in Dynamic Kubernetes Environments

  • Past Webinar

    Improving Security Forensics in Kubernetes Environments

  • Past Webinar

    Kubernetes Security Considerations for IDS/IPS in the age of TLS v1.3

  • Past Webinar

    Top 5 Best Practices for Kubernetes Network Security and Compliance

  • Past Webinar

    Securing Kubernetes Applications on AWS ECS & EKS

  • Past Webinar

    5 Tips for Organizing Your Kubernetes Security Policies

  • Past Webinar

    Microservices Security Summer Camp – Session 3

  • Past Webinar

    Microservices Security Summer Camp – Session 2

  • Past Webinar

    Microservices Security Summer Camp – Session 1

Subscribe to our newsletter

Get updates on webinars, blog posts, new releases and more!

Thanks for signing up. You must confirm your email address before we can send you. Please check your email and follow the instructions.