Under the Hood: Setting Guardrails for your K8S Cluster with Admissions Control

Logo
Presented by

Alfred Trevino, Cloud Technical Marketing Manager

About this talk

As we saw during last Under The Hood session, CloudGuard offers the ability to enforce compliance with industry regulations and security best practices during pre-deployment with the ShiftLeft tool. Today we will talk about using Admission Control to enforce post-deployment governance where CloudGuard ensures that the live environment adheres to the compliance and security frameworks mandated. Runtime Protection monitors system calls done by workload containers, or you can configure CloudGuard to block unwanted, malicious, or anomalous activity that it discovers with easy to setup use cases.

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (313)
Subscribers (48507)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.