InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Under the Hood: Setting Guardrails for your K8S Cluster with Admissions Control

Presented by

Alfred Trevino, Cloud Technical Marketing Manager

About this talk

As we saw during last Under The Hood session, CloudGuard offers the ability to enforce compliance with industry regulations and security best practices during pre-deployment with the ShiftLeft tool. Today we will talk about using Admission Control to enforce post-deployment governance where CloudGuard ensures that the live environment adheres to the compliance and security frameworks mandated. Runtime Protection monitors system calls done by workload containers, or you can configure CloudGuard to block unwanted, malicious, or anomalous activity that it discovers with easy to setup use cases.
Check Point Software

Check Point Software

58723 subscribers422 talks
The Leading Cyber Security Platform
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.
Related topics