Hi [[ session.user.profile.firstName ]]

Tigera

  • Date
  • Rating
  • Views
  • Why Can’t We Be Friends? – Kubernetes in a Zone-Based Architecture World
    Why Can’t We Be Friends? – Kubernetes in a Zone-Based Architecture World
    Eddie Esquivel, Sr. Solutions Engineer with Tigera Recorded: Jul 10 2019 33 mins
    Since practically the beginning of data networks, Network and Security professionals have gravitated towards, and grown to love, Zone-Based network architectures.

    However, with the evolving landscape driven by microservices, containers, and Kubernetes, Zone-Based designs are being challenged to keep networks secure without creating an unreasonable amount of continuous configuration changes to firewalls.

    With this challenge, comes the opportunity to rethink how network security can be delivered more effectively and efficiently. The Cloud and Kubernetes offer a ton of flexibility but how do we achieve security, visibility, and compliance in these new areas.

    This technical webinar will dive into how Tigera can help us answer these challenges and more in the cloud landscape.
  • Kubernetes & Tigera: Network Policies, Security, and Auditing
    Kubernetes & Tigera: Network Policies, Security, and Auditing
    Drew Oetzel, Senior Technical Solutions Engineer with Tigera Recorded: Jun 19 2019 50 mins
    Of course, Tigera's ability to provide Kubernetes pod networking and facilitate service discovery is extremely valuable, but its real superpower is that both Tigera's commercial offerings and open-source Tigera Calico can implement network security policies inside a Kubernetes cluster.

    Most external network security operates at the perimeter or at the physical network layer of Kubernetes. Because Tigera runs inside Kubernetes, it can provide policy and security based on Kubernetes structures like namespaces and deployments.

    In this webinar, Senior Technical Solutions Engineer with Tigera, Drew Oetzel, will show you examples of implementing these types of policies for several common security and compliance use cases.

    He'll also show you why implementing these types of security policies is so important to keeping your ever-expanding Kubernetes workloads secure.
  • Meeting PCI DSS Network Security Requirements in Kubernetes Environments
    Meeting PCI DSS Network Security Requirements in Kubernetes Environments
    Vince Lau, CISSP, Director of Product Marketing at Tigera Recorded: Jun 5 2019 50 mins
    Compliance standards such as PCI DSS have assumed that traditional characteristics and behaviors of the development and delivery model would continue to be constant going forward. With the Container/Kubernetes revolution, that set of assumptions is no longer entirely correct. Attend this webinar and learn about what's changed, how those changes weaken your compliance and control environment, and what you can do to adjust to the new reality.
  • Extending Firewalls to Kubernetes to Not Break Existing Security Architectures
    Extending Firewalls to Kubernetes to Not Break Existing Security Architectures
    Amit Gupta, VP of Product Management, Tigera Recorded: May 21 2019 42 mins
    Security teams use firewalls to secure their production environments, often using a zone-based architecture, and Kubernetes does not deploy well to that architecture. Application teams are launching new business-critical applications on Kubernetes and are aggressively moving to production. A clash is bound to happen.

    In this webinar, we will describe an approach to extend firewalls to Kubernetes that will accelerate deployment to production, save time & money, and preserve existing security processes and investments.
  • Securing Kubernetes Applications in Google Cloud with Tigera
    Securing Kubernetes Applications in Google Cloud with Tigera
    Amit Gupta, VP of Product Management, Tigera Recorded: Apr 17 2019 49 mins
    Calico was just recently embedded into Google GKE-On prem and we will demonstrate how to implement security controls on GKE. Don’t miss this webinar as we will be sharing some common network security challenges in the Kubrnetes environment. In addition, we will explore enterprise-grade Calico features provided in Tigera Secure which enables enterprises to add network security support in hybrid cloud environments with:

    + Network Flow Logs that record accepted and denied traffic, which policies denied the traffic, and workload context such as Kubernetes namespaces, labels, and metadata. Tigera Secure also provides dynamic graphical visualization of network flows.

    + Tiered policy controls with role-based access controls, to enable multiple teams to independently manage their respective security policies within the governance of the security team.

    + Anomaly Detection capabilities that provide insight into unusual behaviors and sophisticated attacks that compromise the security and performance of Kubernetes environments.
  • Istio Traffic Management - Best Practices in Secure Kubernetes Environments
    Istio Traffic Management - Best Practices in Secure Kubernetes Environments
    Christopher Liljenstolpe, CTO, Solutions, Tigera Recorded: Apr 3 2019 49 mins
    Istio’s traffic management decouples traffic flow and infrastructure scaling allowing you to specify what rules to govern traffic rather than which specific pods should receive traffic.

    In this webinar we'll discuss the following traffic management topics:
    · Discovery Load Balancing
    · Failure Handling
    · Fault Injection
  • Kubernetes & Zero Trust Security: Supporting a CARTA with Anomaly Detection
    Kubernetes & Zero Trust Security: Supporting a CARTA with Anomaly Detection
    Christopher Liljenstolpe, CTO, Solutions, Tigera Recorded: Mar 20 2019 35 mins
    Learn how Anomaly Detection supports, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Anomaly Detection expands the zero trust network security model and continuously assess the application and network risk that enables adaptive policy adjustments. Anomaly Detection identifies outliers in Kubernetes clusters by building profiles of typical workloads and components to know when they start to deviate from the norm. It also manages network risk by continuously monitoring for activities such as reconnaissance scan, service connections anomaly, service bytes anomaly, and pod outlier activity detection.
  • Kubernetes & Zero Trust Security: Supporting a CARTA Approach
    Kubernetes & Zero Trust Security: Supporting a CARTA Approach
    Christopher Liljenstolpe, CTO, Solutions, Tigera Recorded: Mar 6 2019 31 mins
    Learn how to support a continuous adaptive risk and trust assessment (CARTA) approach leveraging accurate Kubernetes flow logs. 5-tuple logging is commonly used to monitor and detect anomalies and produces unreliable data that cannot accurately identify anomalies nor prove enforcement of security policies. Network flow logs include workload identity and other metadata that help continuously monitor activities within Kubernetes clusters.
  • Top Container Security Lessons from Deploying Kubernetes and Red Hat OpenShift
    Top Container Security Lessons from Deploying Kubernetes and Red Hat OpenShift
    Matt Smith, Chief Architect, Red Hat & Christopher Liljenstolpe, CTO, Solutions, Tigera Recorded: Feb 21 2019 63 mins
    Join Red Hat Chief Architect, Matt Smith, along with Tigera CTO, Solutions, Christopher Liljenstolpe, as they share their experience and knowledge helping leading enterprises achieve their key business transformation initiatives around moving to secure cloud-based, containerized microservice applications. In this 60 minute webinar, they will cover their top lessons learned on network security and Red Hat OpenShift.
  • Zero Trust Security: Supporting a CARTA approach with Network Security
    Zero Trust Security: Supporting a CARTA approach with Network Security
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Jan 24 2019 33 mins
    Learn how to support, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Network security enables microsegmentation and is a core component of a zero trust security model. It allows you to protect your workloads against threats without relying on assumptions about the network, infrastructure, and workloads.

Embed in website or blog