The security requirements are the same, but the technologies and approach are changing. Every deployment includes a distinct operating system, applications are disaggregated and communicating across the network, different workloads are co-located on hosts, and the expectation of speed from development to production has never been greater. Infrastructure Development, and Security teams need to meet with an understanding of the broad challenge and agree on approaches to mitigating risks.
Hear from Red Hat experts about some of the technologies that help maintain (and even improve) the security posture while gaining the productivity value of the container platform.
To gain access, select sessions below and register for free.