Hi [[ session.user.profile.firstName ]]

Cloud Security Gaps

Most organizations are moving existing applications to public cloud environments or building new applications that are designed for the cloud from the beginning. When this shift to the cloud occurs there are a number of security assumptions in the legacy, datacenter-centric security approach that tend to fail. In this webinar learn more about:

-Why the concept of network segmentation as a security counter measure is not translating successfully to cloud environments.
-The pitfalls of relying on security groups and 3rd party firewall appliances for segmentation in public clouds
-Introduction of zero trust security model coupled with workload identity as a new control point for security applications in the cloud
Recorded Oct 9 2018 30 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ariful Huq – Director of Product Management, Aporeto
Presentation preview: Cloud Security Gaps

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cloud Security Gaps Recorded: Oct 9 2018 30 mins
    Ariful Huq – Director of Product Management, Aporeto
    Most organizations are moving existing applications to public cloud environments or building new applications that are designed for the cloud from the beginning. When this shift to the cloud occurs there are a number of security assumptions in the legacy, datacenter-centric security approach that tend to fail. In this webinar learn more about:

    -Why the concept of network segmentation as a security counter measure is not translating successfully to cloud environments.
    -The pitfalls of relying on security groups and 3rd party firewall appliances for segmentation in public clouds
    -Introduction of zero trust security model coupled with workload identity as a new control point for security applications in the cloud
  • Best Practices for Securing Microservices Recorded: Jun 27 2018 34 mins
    Ariful Huq, Director of Product Management, Aporeto
    The adoption of cloud-managed services such as managed databases and machine learning gives developers the freedom to innovate in the application business logic. Coupling microservices with adoption of cloud infrastructure and cloud managed offerings is a recipe for high-velocity application development. But what does this transformation mean for security teams?

    Watch this webinar to learn:

    -How to secure heterogeneous cloud environments.
    -How to follow Zero Trust principles of authentication and authorization for all transactions.
    -What are the main components of security in the microservices stack?
The latest in Webcasts and Videos from Aporeto
Listen to industry experts discuss the latest trends and disruptions in microservices, container and cloud security and how to deploy Zero Trust in the cloud.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cloud Security Gaps
  • Live at: Oct 9 2018 6:00 pm
  • Presented by: Ariful Huq – Director of Product Management, Aporeto
  • From:
Your email has been sent.
or close