InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

DevOps Access to Cloud Workloads – It’s Time for Zero Trust

Presented by

Noa Zilberman, Co-Founder and Chief Product Officer of Odo Security (Acquired by Check Point)

About this talk

Every DevOps engineer, cloud workload and datacenter added to your infrastructure requires access permissions tailored to them. The exponential growth in complexity of managing IT and production environments often leads to assigning developers with administrator privileges. The result is a broad attack surface through which attackers can move laterally and attempt exploitation and theft of sensitive data. Built on the concept of ‘Never Trust, Always Verify’, Zero Trust Network Access can change that. Join this session to learn how you can deliver smooth and secure access to cloud workloads for DevOps and administrators using: · Built-in privileged access management (PAM) · Automated server onboarding and resource discovery (AWS) · Tag-based management for dynamic, scalable policy enforcement · Cloud deployments, that require no agents or clients to manage · Full audit trail with session recordings Leave the complexity behind. Join us for a firsthand look.
Check Point Software

Check Point Software

58922 subscribers421 talks
The Leading Cyber Security Platform
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.
Related topics