Hi [[ session.user.profile.firstName ]]

For Cloud Apps, Network Security Isn’t Enough

Jason Schmitt is CEO at Aporeto, a firm focused on new approaches to securing applications in the cloud. In this video from RSA 2019, Jason speaks with Charlene O’Hanlon about the security pitfalls around moving applications to the cloud, and why network infrastructure’s own baked-in security isn’t enough.
Recorded Mar 19 2019 9 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Schmitt
Presentation preview: For Cloud Apps, Network Security Isn’t Enough

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Aporeto Unplugged: Sales Workshop Recorded: Apr 11 2019 25 mins
    Amir Sharif
    The objective is to accelerate customers' migration to AWS. If we simplify and strengthen application security, we are half-way there.

    Aporeto's identity-powered cloud security protects workloads based on their identity independent of the underlying infrastructure. This makes Aporeto's security portable: Once customers secure their workloads on-premise, they may migrate all or part of their workloads to AWS and still preserve the same zero trust posture.

    Goodbye complex security setups. Hello easier migration to AWS. Join us on this webinar to learn more.
  • For Cloud Apps, Network Security Isn’t Enough Recorded: Mar 19 2019 9 mins
    Jason Schmitt
    Jason Schmitt is CEO at Aporeto, a firm focused on new approaches to securing applications in the cloud. In this video from RSA 2019, Jason speaks with Charlene O’Hanlon about the security pitfalls around moving applications to the cloud, and why network infrastructure’s own baked-in security isn’t enough.
  • Live Webcam Panel: Operationalizing Cybersecurity Recorded: Mar 19 2019 56 mins
    Michelle Drolet, Towerwal, Amy McLaughlin, Oregon State University and Ariful Huq, Aporeto
    Cybersecurity, much like safety, cannot be achieved - it is an ongoing process that changes and adjusts to respond to the threat landscape, business needs and resources. As essential a cybersecurity strategy is to the enterprise, so is the implementation of it.

    Join us for an interactive Q&A panel with security leaders to learn more about how to operationalize cybersecurity.

    Topics up for discussion:
    - Making information security relatable
    - Building security programs
    - Defining your cybersecurity strategy
    - Translating your cybersecurity strategy into a risk management plan
    - Operationalizing your cybersecurity strategy
    - Using the maturity capability model for measuring success

    Michelle Drolet, CEO, Towerwall
    Amy McLaughlin, Director of Information Services, Oregon State University
    Ariful Huq, Director of Product Management, Aporeto
  • Identity-Powered Cloud Security Recorded: Mar 4 2019 14 mins
    Amir Sharif
    Today’s IT infrastructures are vast, complex, and consequently fragile. The problem is that while developers need the sophisticated functionality modern IT provides, the fragility poses a significant roadblock—particularly when security and infra requirements enter the picture. In this video, Amir Sharif discusses how Aporeto addresses the security aspects of this problem by bringing unified identity-powered security to complex hybrid infrastructures.
  • Cloud Security Gaps Recorded: Oct 9 2018 30 mins
    Ariful Huq – Director of Product Management, Aporeto
    Most organizations are moving existing applications to public cloud environments or building new applications that are designed for the cloud from the beginning. When this shift to the cloud occurs there are a number of security assumptions in the legacy, datacenter-centric security approach that tend to fail. In this webinar learn more about:

    -Why the concept of network segmentation as a security counter measure is not translating successfully to cloud environments.
    -The pitfalls of relying on security groups and 3rd party firewall appliances for segmentation in public clouds
    -Introduction of zero trust security model coupled with workload identity as a new control point for security applications in the cloud
  • Red Hat OpenShift Multicloud Application Security with Aporeto Recorded: Sep 22 2018 5 mins
    Secure applications on Red Hat OpenShift Container Platform in the multi-cloud with Aporeto. Workload isolation, API access control, host threat detection, container image vulnerability management, secrets & certificates management, and visualization, all based on your application identity.
  • Best Practices for Securing Microservices Recorded: Jun 27 2018 34 mins
    Ariful Huq, Director of Product Management, Aporeto
    The adoption of cloud-managed services such as managed databases and machine learning gives developers the freedom to innovate in the application business logic. Coupling microservices with adoption of cloud infrastructure and cloud managed offerings is a recipe for high-velocity application development. But what does this transformation mean for security teams?

    Watch this webinar to learn:

    -How to secure heterogeneous cloud environments.
    -How to follow Zero Trust principles of authentication and authorization for all transactions.
    -What are the main components of security in the microservices stack?
  • Cloud Security for Financial Institutions Recorded: Jun 15 2018 40 mins
    The adoption of cloud and containers requires new and more dynamic methods of securing applications. These methods need to address the complexity associated with applications that can span multiple clouds, hybrid infrastructure and private deployments. Instead of relying on traditional networking constructs, cloud-native security needs to enable security teams to centrally manage security policies and enforce them in a distributed fashion.

    In this webinar, we will discuss how to enable faster cloud adoption with less security friction. We will also address the following topics:

    – Customer case studies for addressing PCI & SWIFT requirements in the cloud

    – Gaining visibility into applications data flow before moving to, and after deploying in, the cloud

    – Adopting the Zero Trust security model that requires authentication and authorization for all communication
  • Why Cloud Security Requires a Strong Application Identity Recorded: May 24 2018 31 mins
    Amir Sharif
    Zero Trust security for microservices, containers and cloud works through the transparent generation of strong application identity. This identity is used for authenticating and authorizing application component interaction with themselves, user interfaces, and external services. In this webinar we will discuss how enterprises can adopt microservices and the cloud while leveraging their existing, brownfield infrastructure without compromising security.
  • Aporeto Overview: Zero Trust Security for Microservices, Containers and Cloud Recorded: Mar 27 2018 12 mins
    Jason Schmitt
    Hear from Aporeto’s CEO, Jason Schmitt, on our products, solutions and key use cases.
  • Aporeto in Action Recorded: Mar 1 2018 10 mins
    Aporeto is a Zero Trust security solution for containers, microservices, cloud and legacy applications. In this On-Demand demonstration learn about key features and use cases of the Aporeto solution, including:

    – Policy in Action across Multi-Cluster and Multi-Cloud

    – Visibility Across Multi-Cluster Environments

    – Automated container runtime protection
  • Google Application Layer Transport Security Recorded: Feb 2 2018 32 mins
    Ariful Huq
    "Google is known for its brilliant engineering, its infrastructure efficiency, and its approach to robust security.

    In this webinar, learn about how to implement ATLS in your enterprise environment."
  • Simplify Your Cloud Application Topology with Aporeto Recorded: Aug 16 2017 5 mins
    By separating hosted cloud application service security from the network, you can design faster, scalable, and manageable cloud application topologies. Make the multi-cloud your datacenter with Aporeto.

    Learn more: https://www.aporeto.com/
  • Aporeto Takes Red Hat OpenShift into the Multi-cloud Recorded: Jul 25 2017 3 mins
    Aporeto's unique method for application contextual identity and policy enforcement secures applications and microservices hosted on the Red Hat OpenShift Container Platform, anywhere.

    Learn more: https://www.aporeto.com/
The latest in Webcasts and Videos from Aporeto
Listen to industry experts discuss the latest trends and disruptions in microservices, container and cloud security and how to deploy Zero Trust in the cloud.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: For Cloud Apps, Network Security Isn’t Enough
  • Live at: Mar 19 2019 3:40 pm
  • Presented by: Jason Schmitt
  • From:
Your email has been sent.
or close