Hi [[ session.user.profile.firstName ]]

Tigera Webinars

  • Date
  • Rating
  • Views
  • Istio - Enabling a Defense in Depth Network Security Posture
    Istio - Enabling a Defense in Depth Network Security Posture
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Dec 4 2018 61 mins
    Are you looking into Istio? Many companies are investigating Istio to reduce the challenges of managing microservices as it delivers a uniform way to connect, monitor, and secure environments - especially used in concert with Kubernetes.

    Did you know that Istio is a part of the Tigera Secure solutions, that we play an active role in developing Istio, and we co-chair the Istio security special interest group? We'd like to share our expertise to help you understand how Istio fits into a comprehensive network security model.

    Attend our webinar on Tuesday, December 4 to learn about implementing a defense in depth posture that enables zero-trust network security across L3-L7 and allows Application, DevOps, Platform Engineering, Network, and Security and Compliance teams to seamlessly work together.

    Join Christopher Liljenstolpe, CTO, solutions at Tigera as he discusses strategies and technical details on:

    + Integrating Istio Policy into Kubernetes NetworkPolicy resulting in a single unified policy called application layer policy (ALP)
    + Implementing defense in depth by enforcing policies at multiple points within the infrastructure
    + Authenticating the identity of each request based on multiple criteria
    + Operationalizing ALP across heterogeneous environments
  • Kubernetes: Securing Hybrid and Multi-Cloud Environments
    Kubernetes: Securing Hybrid and Multi-Cloud Environments
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Nov 15 2018 45 mins
    Kubernetes is widely used to re-architect traditional applications. Many organizations first set up Kubernetes within their on-prem environment and then later expand to the public cloud. This hybrid environment often creates security and compliance challenges with workloads. Join this webinar to learn how to leverage universal security policy definition that works across a hybrid environment.
  • Enforcing Compliance in Dynamic Kubernetes Environments
    Enforcing Compliance in Dynamic Kubernetes Environments
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Oct 30 2018 35 mins
    While the Container/Kubernetes revolution is starting to deliver on its promise of making application development and delivery more agile and responsive, it does so by changing some of the traditional characteristics and behaviors of the development and delivery model. Control and compliance regimes have assumed that these would continue to be constant going forward. That set of assumptions is no longer entirely correct. Attend this webinar and learn about what's changed, how those changes weaken your compliance and control environment, and what you can do to not only adjust to the new reality but actually have your security team being a key enabler of the new agile model.
  • Introduction to Kubernetes Network Policy with Use Cases
    Introduction to Kubernetes Network Policy with Use Cases
    Cody McCain, Senior Solution Architect, at Tigera Recorded: Oct 10 2018 32 mins
    In Kubernetes, Network Policy allows you to define a policy determining what traffic is allowed to flow to and from specific workloads. By default, Kubernetes permits ingress and egress traffic to and from all pods in a namespace. Without correct configuration your risk of a significant security breach is high. Attend this webinar and learn best practices in configuring Kubernetes network security.
  • Improving Security Forensics in Kubernetes Environments
    Improving Security Forensics in Kubernetes Environments
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Sep 27 2018 42 mins
    The success of Kubernetes has made monitoring and alerting more difficult for traditional Security Information and Event Management (SIEM) tools. Attend this live webinar to learn how implementing the right network security and compliance solution will improve the accuracy and completeness of security forensic monitoring and alerting when using Kubernetes.
  • Kubernetes Security Considerations for IDS/IPS in the age of TLS v1.3
    Kubernetes Security Considerations for IDS/IPS in the age of TLS v1.3
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Sep 18 2018 48 mins
    TLS v1.3 introduces several new security improvements over TLS 1.2 but some of these enhancements have an impact on network-based security solutions such as IDS/IPS. While the goal is to enhance the overall security at the application level, there are a few scenarios that are not easily solved when introducing the new technology, especially in Kubernetes environments. Watch this webinar to learn about security and compliance considerations for Kubernetes when implementing TLS v1.3.
  • Top 5 Best Practices for Kubernetes Network Security and Compliance
    Top 5 Best Practices for Kubernetes Network Security and Compliance
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Aug 30 2018 47 mins
    While a microservice architecture, orchestrated by applications like Kubernetes, offers a tremendous business advantage for time to market, proper security and compliance controls must be put in place.

    This is a crucial step when deploying microservices and teams must work together by using the proper tools during implementation. We will explore 5 things you can do to meet security and compliance requirements for your microservices stack.

    Watch this webinar to learn about considerations for security and compliance with microservices, understanding key principles for compliance, and leveraging the proper security tools and methods for compliance.
  • Network Security & Compliance for Kubernetes on AWS and EKS
    Network Security & Compliance for Kubernetes on AWS and EKS
    Amit Gupta, VP Product Management at Tigera, and Carmen Puccio, Principal System Architect at AWS Recorded: Aug 14 2018 60 mins
    Join this exclusive AWS webinar co-hosted with Tigera. We will demo how to implement turnkey compliance and security controls for Kubernetes in AWS and Amazon EKS environments.

    This webinar will explore how to extract data required for IT audits and implement network segmentation and encryption to meet your security and compliance requirements. We'll cover the security and compliance challenges that users face when deploying Kubernetes in AWS and Amazon EKS environments

    We'll also present a live demonstration of key capabilities within Tigera Secure Cloud Edition
  • How to Chart Your Route to Cloud Native
    How to Chart Your Route to Cloud Native
    Amit Gupta, VP Product Management, Tigera and Robert Starmer, Cloud Advisor & Founding Partner, Kumulus Technologies Recorded: Jun 13 2018 24 mins
    Join this live Q&A with Amit Gupta, VP Product Management at Tigera, as he provides tips, advice, best practices and industry insights into going cloud native.

    He will answer all of your questions live from DockerCon and help your organization discover why Kubernetes is the #1 container orchestration tool, how it plays a vital role in application security, and how clout native architectures help solve application connectivity problems.
  • Securing Kubernetes
    Securing Kubernetes
    Robert Starmer, Kumulus Technologes, Amit Gupta, Tigera, Omar Lari, AWS & Susmitha Kanakamedala, Box Recorded: Jun 13 2018 45 mins
    Join this live panel discussion with experts at DockerCon to learn why Kubernetes is the most popular container orchestration tool and why application security is key to your cloud native journey.

    Tune into this interactive Q&A session to hear from Docker, Infrastructure, Cloud and DevOps experts while they discuss the following:

    - How are open source systems like Kubernetes changing the way we deploy, scale and manage applications?
    - How does Kubernetes enable the cloud-native journey?
    - Security best practices for Kubernetes deployment
    - The major tenets of Kubernetes security


    And much more!

    This live panel will be streamed directly from DockerCon 2018 in San Francisco! Join us live from the comfort of your desk.

    Moderated by: Robert Starmer, Cloud Advisor & Founding Partner, Kumulus Technologies
    Panelists: Amit Gupta, VP Product Management, Tigera, Omar Lari, Business Development Manager - Container Services, AWS and Susmitha Kanakamedala, Sr. Software Engineer, Box

Embed in website or blog