Under the Hood: Building and Automating Pipeline Security

Logo
Presented by

Giovanni Verrienti, Cloud Security Architect, Check Point

About this talk

Traditional security is not built for CI/CD and right now many organizations are being forced to trade agility for security. During this webinar, you’ll learn how to create a secure, multi-layered infrastructure with built-in pipeline security. We will also explore the role that DevSecOps are playing during the continuous integration/deployment, and how to solve issues with secrets sprawl, API tokens, exposed certificates, misconfigurations and more! Using Check Point Spectral, developers can easily scan their code and IAC for vulnerabilities without slowing down the process. Join us as we illustrate how to shift left and provide developers with the tools to be secure.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (331)
Subscribers (50137)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.