Hi [[ session.user.profile.firstName ]]

Aporeto

  • Date
  • Rating
  • Views
  • For Cloud Apps, Network Security Isn’t Enough
    For Cloud Apps, Network Security Isn’t Enough
    Jason Schmitt Recorded: Mar 19 2019 9 mins
    Jason Schmitt is CEO at Aporeto, a firm focused on new approaches to securing applications in the cloud. In this video from RSA 2019, Jason speaks with Charlene O’Hanlon about the security pitfalls around moving applications to the cloud, and why network infrastructure’s own baked-in security isn’t enough.
  • Live Webcam Panel: Operationalizing Cybersecurity
    Live Webcam Panel: Operationalizing Cybersecurity
    Michelle Drolet, Towerwal, Amy McLaughlin, Oregon State University and Ariful Huq, Aporeto Recorded: Mar 19 2019 56 mins
    Cybersecurity, much like safety, cannot be achieved - it is an ongoing process that changes and adjusts to respond to the threat landscape, business needs and resources. As essential a cybersecurity strategy is to the enterprise, so is the implementation of it.

    Join us for an interactive Q&A panel with security leaders to learn more about how to operationalize cybersecurity.

    Topics up for discussion:
    - Making information security relatable
    - Building security programs
    - Defining your cybersecurity strategy
    - Translating your cybersecurity strategy into a risk management plan
    - Operationalizing your cybersecurity strategy
    - Using the maturity capability model for measuring success

    Moderator:
    Michelle Drolet, CEO, Towerwall
    Panelists:
    Amy McLaughlin, Director of Information Services, Oregon State University
    Ariful Huq, Director of Product Management, Aporeto
  • Cloud Security Gaps
    Cloud Security Gaps
    Ariful Huq – Director of Product Management, Aporeto Recorded: Oct 9 2018 30 mins
    Most organizations are moving existing applications to public cloud environments or building new applications that are designed for the cloud from the beginning. When this shift to the cloud occurs there are a number of security assumptions in the legacy, datacenter-centric security approach that tend to fail. In this webinar learn more about:

    -Why the concept of network segmentation as a security counter measure is not translating successfully to cloud environments.
    -The pitfalls of relying on security groups and 3rd party firewall appliances for segmentation in public clouds
    -Introduction of zero trust security model coupled with workload identity as a new control point for security applications in the cloud
  • Best Practices for Securing Microservices
    Best Practices for Securing Microservices
    Ariful Huq, Director of Product Management, Aporeto Recorded: Jun 27 2018 34 mins
    The adoption of cloud-managed services such as managed databases and machine learning gives developers the freedom to innovate in the application business logic. Coupling microservices with adoption of cloud infrastructure and cloud managed offerings is a recipe for high-velocity application development. But what does this transformation mean for security teams?

    Watch this webinar to learn:

    -How to secure heterogeneous cloud environments.
    -How to follow Zero Trust principles of authentication and authorization for all transactions.
    -What are the main components of security in the microservices stack?
  • Cloud Security for Financial Institutions
    Cloud Security for Financial Institutions
    Aporeto Recorded: Jun 15 2018 40 mins
    The adoption of cloud and containers requires new and more dynamic methods of securing applications. These methods need to address the complexity associated with applications that can span multiple clouds, hybrid infrastructure and private deployments. Instead of relying on traditional networking constructs, cloud-native security needs to enable security teams to centrally manage security policies and enforce them in a distributed fashion.

    In this webinar, we will discuss how to enable faster cloud adoption with less security friction. We will also address the following topics:

    – Customer case studies for addressing PCI & SWIFT requirements in the cloud

    – Gaining visibility into applications data flow before moving to, and after deploying in, the cloud

    – Adopting the Zero Trust security model that requires authentication and authorization for all communication
  • Why Cloud Security Requires a Strong Application Identity
    Why Cloud Security Requires a Strong Application Identity
    Amir Sharif Recorded: May 24 2018 31 mins
    Zero Trust security for microservices, containers and cloud works through the transparent generation of strong application identity. This identity is used for authenticating and authorizing application component interaction with themselves, user interfaces, and external services. In this webinar we will discuss how enterprises can adopt microservices and the cloud while leveraging their existing, brownfield infrastructure without compromising security.
  • Aporeto Overview: Zero Trust Security for Microservices, Containers and Cloud
    Aporeto Overview: Zero Trust Security for Microservices, Containers and Cloud
    Jason Schmitt Recorded: Mar 27 2018 12 mins
    Hear from Aporeto’s CEO, Jason Schmitt, on our products, solutions and key use cases.
  • Aporeto in Action
    Aporeto in Action
    Aporeto Recorded: Mar 1 2018 10 mins
    Aporeto is a Zero Trust security solution for containers, microservices, cloud and legacy applications. In this On-Demand demonstration learn about key features and use cases of the Aporeto solution, including:

    – Policy in Action across Multi-Cluster and Multi-Cloud

    – Visibility Across Multi-Cluster Environments

    – Automated container runtime protection
  • Google Application Layer Transport Security
    Google Application Layer Transport Security
    Ariful Huq Recorded: Feb 2 2018 32 mins
    "Google is known for its brilliant engineering, its infrastructure efficiency, and its approach to robust security.

    In this webinar, learn about how to implement ATLS in your enterprise environment."

Embed in website or blog