Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 7 Steps to Secure Your Kubernetes Cluster Pavel Chistikov, Kasten by Veeam Running and securing Kubernetes clusters in production is a complex process, but it doesn’t have to be. Join Pavel Chistikov at Kasten by Veeam who wi... 6 days ago | 57 mins 7 Steps to Secure Your Kubernetes Cluster Pavel Chistikov, Kasten by Veeam Running and securing Kubernetes clusters in production is a complex process, but it doesn’t have to be. Join Pavel Chistikov at Kasten by Veeam who wi... 2 weeks ago | 57 mins Ep 8 - Securing Apps Starts with Securing Kubernetes Mark Boddington Solutions Architect and Philippe Cloup Senior Solutions Architect When an application enters production as a container, it arrives as a changeless artifact. The first few moments of its existence are spent communicat... 3 months ago | 63 mins 7 Steps to Secure Your Kubernetes Cluster Pavel Chistikov, Kasten by Veeam Running and securing Kubernetes clusters in production is a complex process, but it doesn’t have to be. Join Pavel Chistikov at Kasten by Veeam who wi... 6 days ago | 57 mins Discover Palette, the easy way to manage your Kubernetes clusters Saad Malik This webinar is perfect for platform engineers, devops engineers and operations teams, whether you’re looking to start running Kubernetes in productio... 4 weeks ago | 50 mins AWS & Fortanix: Supporting Digital Sovereignty in the Cloud Patrick Palmer, Senior Security Specialist - AWS, Hildegard von Waldenfels, Wolfgang Joppich, Senior Solutions Architect Regulations like the Schrems II ruling and the GDPR require organizations to ensure PII data from citizens in the European Economic Area (EEA) remains... 4 weeks ago | 61 mins Load balancer orchestration: The key to conquering complexity Muralidharan Palanisamy, Chief Solutions Officer, AppViewX Load balancers like F5, NGINX, AVI, A10 and others can be extremely challenging to manage, especially when you have several on your plate at a time. A... 2 months ago | 31 mins Terraform and K8s: is Terraform enough? Vincent Ramirez Let’s talk Infrastructure as Code (IaC), Terraform and K8s! There’s no dispute: Terraform is a great tool to deploy immutable infrastructure. But th... 2 months ago | 64 mins Data Protector Role Based Access Control Marc Fisseler - Presales Consultant, Data Protection Backup as a Service (BaaS) bietet die Möglichkeit, Unternehmensdaten über einen Service Provider zu sichern, der die erforderliche Backup- und Wiederh... 1 month ago | 55 mins STRONGER 2022: Safe locker in Azure Cloud: Key Vault Abhilasha Vyas, Ph.D., Business Unit Head, Cloud Security and BI at CloudThat Organizations need to store keys used for encryption and decryption in a safe place. Azure key vault is the solution to that. This session from the ST... 2 months ago | 32 mins Load more