Hi [[ session.user.profile.firstName ]]

Tigera Webinars

  • Date
  • Rating
  • Views
  • Kubernetes & Zero Trust Security: Supporting a CARTA Approach
    Kubernetes & Zero Trust Security: Supporting a CARTA Approach
    Christopher Liljenstolpe, CTO, Solutions, Tigera Recorded: Mar 6 2019 31 mins
    Learn how to support a continuous adaptive risk and trust assessment (CARTA) approach leveraging accurate Kubernetes flow logs. 5-tuple logging is commonly used to monitor and detect anomalies and produces unreliable data that cannot accurately identify anomalies nor prove enforcement of security policies. Network flow logs include workload identity and other metadata that help continuously monitor activities within Kubernetes clusters.
  • Top Container Security Lessons from Deploying Kubernetes and Red Hat OpenShift
    Top Container Security Lessons from Deploying Kubernetes and Red Hat OpenShift
    Matt Smith, Chief Architect, Red Hat & Christopher Liljenstolpe, CTO, Solutions, Tigera Recorded: Feb 21 2019 63 mins
    Join Red Hat Chief Architect, Matt Smith, along with Tigera CTO, Solutions, Christopher Liljenstolpe, as they share their experience and knowledge helping leading enterprises achieve their key business transformation initiatives around moving to secure cloud-based, containerized microservice applications. In this 60 minute webinar, they will cover their top lessons learned on network security and Red Hat OpenShift.
  • Zero Trust Security: Supporting a CARTA approach with Network Security
    Zero Trust Security: Supporting a CARTA approach with Network Security
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Jan 24 2019 33 mins
    Learn how to support, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Network security enables microsegmentation and is a core component of a zero trust security model. It allows you to protect your workloads against threats without relying on assumptions about the network, infrastructure, and workloads.
  • Kubernetes Ingress & Egress Traffic Management
    Kubernetes Ingress & Egress Traffic Management
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Jan 11 2019 38 mins
    The networking infrastructure within a Kubernetes cluster is usually
    private, or at least internally oriented. So what do you want to do
    when you need to expose your application or services to the public?
    What are your options for connecting to resources outside of your
    cluster? In this webinar we'll discuss:

    * Address cluster endpoints from the outside world
    * Communicate from within the cluster to external resources
    * Load balance services
  • Leveraging Kubernetes Services & DNS
    Leveraging Kubernetes Services & DNS
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Dec 19 2018 32 mins
    The Domain Name System (DNS) is used to associate IP addresses with meaningful names. By default, Kubernetes clusters configure internal DNS to provide for service discovery automatically. This makes it easy for workloads to locate and work with each other on Kubernetes clusters.
    In this webinar, learn:

    * How DNS resolution works in Kubernetes with a network security solution like Tigera

    * How services and pods get assigned fully qualified domain names (FQDN)

    * The relationship between services and pods
  • Istio - Enabling a Defense in Depth Network Security Posture
    Istio - Enabling a Defense in Depth Network Security Posture
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Dec 4 2018 61 mins
    Are you looking into Istio? Many companies are investigating Istio to reduce the challenges of managing microservices as it delivers a uniform way to connect, monitor, and secure environments - especially used in concert with Kubernetes.

    Did you know that Istio is a part of the Tigera Secure solutions, that we play an active role in developing Istio, and we co-chair the Istio security special interest group? We'd like to share our expertise to help you understand how Istio fits into a comprehensive network security model.

    Attend our webinar on Tuesday, December 4 to learn about implementing a defense in depth posture that enables zero-trust network security across L3-L7 and allows Application, DevOps, Platform Engineering, Network, and Security and Compliance teams to seamlessly work together.

    Join Christopher Liljenstolpe, CTO, solutions at Tigera as he discusses strategies and technical details on:

    + Integrating Istio Policy into Kubernetes NetworkPolicy resulting in a single unified policy called application layer policy (ALP)
    + Implementing defense in depth by enforcing policies at multiple points within the infrastructure
    + Authenticating the identity of each request based on multiple criteria
    + Operationalizing ALP across heterogeneous environments
  • Kubernetes: Securing Hybrid and Multi-Cloud Environments
    Kubernetes: Securing Hybrid and Multi-Cloud Environments
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Nov 15 2018 45 mins
    Kubernetes is widely used to re-architect traditional applications. Many organizations first set up Kubernetes within their on-prem environment and then later expand to the public cloud. This hybrid environment often creates security and compliance challenges with workloads. Join this webinar to learn how to leverage universal security policy definition that works across a hybrid environment.
  • Enforcing Compliance in Dynamic Kubernetes Environments
    Enforcing Compliance in Dynamic Kubernetes Environments
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Oct 30 2018 35 mins
    While the Container/Kubernetes revolution is starting to deliver on its promise of making application development and delivery more agile and responsive, it does so by changing some of the traditional characteristics and behaviors of the development and delivery model. Control and compliance regimes have assumed that these would continue to be constant going forward. That set of assumptions is no longer entirely correct. Attend this webinar and learn about what's changed, how those changes weaken your compliance and control environment, and what you can do to not only adjust to the new reality but actually have your security team being a key enabler of the new agile model.
  • Introduction to Kubernetes Network Policy with Use Cases
    Introduction to Kubernetes Network Policy with Use Cases
    Cody McCain, Senior Solution Architect, at Tigera Recorded: Oct 10 2018 32 mins
    In Kubernetes, Network Policy allows you to define a policy determining what traffic is allowed to flow to and from specific workloads. By default, Kubernetes permits ingress and egress traffic to and from all pods in a namespace. Without correct configuration your risk of a significant security breach is high. Attend this webinar and learn best practices in configuring Kubernetes network security.
  • Improving Security Forensics in Kubernetes Environments
    Improving Security Forensics in Kubernetes Environments
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Sep 27 2018 42 mins
    The success of Kubernetes has made monitoring and alerting more difficult for traditional Security Information and Event Management (SIEM) tools. Attend this live webinar to learn how implementing the right network security and compliance solution will improve the accuracy and completeness of security forensic monitoring and alerting when using Kubernetes.

Embed in website or blog