Past Webinar

Zero Trust Security: Supporting a CARTA approach with Continuous Monitoring

Watch this On-Demand Webinar

Learn how to support a continuous adaptive risk and trust assessment (CARTA) approach leveraging accurate Kubernetes flow logs. 5-tuple logging is commonly used to monitor and detect anomalies and produces unreliable data that cannot accurately identify anomalies nor prove enforcement of security policies. Network flow logs include workload identity and other metadata that help continuously monitor activities within Kubernetes clusters.

Pin It on Pinterest

Share This