Hi [[ session.user.profile.firstName ]]

Leveraging Kubernetes Services & DNS

The Domain Name System (DNS) is used to associate IP addresses with meaningful names. By default, Kubernetes clusters configure internal DNS to provide for service discovery automatically. This makes it easy for workloads to locate and work with each other on Kubernetes clusters.
In this webinar, learn:

* How DNS resolution works in Kubernetes with a network security solution like Tigera

* How services and pods get assigned fully qualified domain names (FQDN)

* The relationship between services and pods
Live online Dec 19 6:00 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera
Presentation preview: Leveraging Kubernetes Services & DNS

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Leveraging Kubernetes Services & DNS Dec 19 2018 6:00 pm UTC 60 mins
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera
    The Domain Name System (DNS) is used to associate IP addresses with meaningful names. By default, Kubernetes clusters configure internal DNS to provide for service discovery automatically. This makes it easy for workloads to locate and work with each other on Kubernetes clusters.
    In this webinar, learn:

    * How DNS resolution works in Kubernetes with a network security solution like Tigera

    * How services and pods get assigned fully qualified domain names (FQDN)

    * The relationship between services and pods
  • Istio - Enabling a Defense in Depth Network Security Posture Recorded: Dec 4 2018 61 mins
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera
    Are you looking into Istio? Many companies are investigating Istio to reduce the challenges of managing microservices as it delivers a uniform way to connect, monitor, and secure environments - especially used in concert with Kubernetes.

    Did you know that Istio is a part of the Tigera Secure solutions, that we play an active role in developing Istio, and we co-chair the Istio security special interest group? We'd like to share our expertise to help you understand how Istio fits into a comprehensive network security model.

    Attend our webinar on Tuesday, December 4 to learn about implementing a defense in depth posture that enables zero-trust network security across L3-L7 and allows Application, DevOps, Platform Engineering, Network, and Security and Compliance teams to seamlessly work together.

    Join Christopher Liljenstolpe, CTO, solutions at Tigera as he discusses strategies and technical details on:

    + Integrating Istio Policy into Kubernetes NetworkPolicy resulting in a single unified policy called application layer policy (ALP)
    + Implementing defense in depth by enforcing policies at multiple points within the infrastructure
    + Authenticating the identity of each request based on multiple criteria
    + Operationalizing ALP across heterogeneous environments
  • Kubernetes: Securing Hybrid and Multi-Cloud Environments Recorded: Nov 15 2018 45 mins
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera
    Kubernetes is widely used to re-architect traditional applications. Many organizations first set up Kubernetes within their on-prem environment and then later expand to the public cloud. This hybrid environment often creates security and compliance challenges with workloads. Join this webinar to learn how to leverage universal security policy definition that works across a hybrid environment.
  • Enforcing Compliance in Dynamic Kubernetes Environments Recorded: Oct 30 2018 35 mins
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera
    While the Container/Kubernetes revolution is starting to deliver on its promise of making application development and delivery more agile and responsive, it does so by changing some of the traditional characteristics and behaviors of the development and delivery model. Control and compliance regimes have assumed that these would continue to be constant going forward. That set of assumptions is no longer entirely correct. Attend this webinar and learn about what's changed, how those changes weaken your compliance and control environment, and what you can do to not only adjust to the new reality but actually have your security team being a key enabler of the new agile model.
  • Introduction to Kubernetes Network Policy with Use Cases Recorded: Oct 10 2018 32 mins
    Cody McCain, Senior Solution Architect, at Tigera
    In Kubernetes, Network Policy allows you to define a policy determining what traffic is allowed to flow to and from specific workloads. By default, Kubernetes permits ingress and egress traffic to and from all pods in a namespace. Without correct configuration your risk of a significant security breach is high. Attend this webinar and learn best practices in configuring Kubernetes network security.
  • Improving Security Forensics in Kubernetes Environments Recorded: Sep 27 2018 42 mins
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera
    The success of Kubernetes has made monitoring and alerting more difficult for traditional Security Information and Event Management (SIEM) tools. Attend this live webinar to learn how implementing the right network security and compliance solution will improve the accuracy and completeness of security forensic monitoring and alerting when using Kubernetes.
  • Kubernetes Security Considerations for IDS/IPS in the age of TLS v1.3 Recorded: Sep 18 2018 48 mins
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera
    TLS v1.3 introduces several new security improvements over TLS 1.2 but some of these enhancements have an impact on network-based security solutions such as IDS/IPS. While the goal is to enhance the overall security at the application level, there are a few scenarios that are not easily solved when introducing the new technology, especially in Kubernetes environments. Watch this webinar to learn about security and compliance considerations for Kubernetes when implementing TLS v1.3.
  • Top 5 Best Practices for Kubernetes Network Security and Compliance Recorded: Aug 30 2018 47 mins
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera
    While a microservice architecture, orchestrated by applications like Kubernetes, offers a tremendous business advantage for time to market, proper security and compliance controls must be put in place.

    This is a crucial step when deploying microservices and teams must work together by using the proper tools during implementation. We will explore 5 things you can do to meet security and compliance requirements for your microservices stack.

    Watch this webinar to learn about considerations for security and compliance with microservices, understanding key principles for compliance, and leveraging the proper security tools and methods for compliance.
  • Network Security & Compliance for Kubernetes on AWS and EKS Recorded: Aug 14 2018 60 mins
    Amit Gupta, VP Product Management at Tigera, and Carmen Puccio, Principal System Architect at AWS
    Join this exclusive AWS webinar co-hosted with Tigera. We will demo how to implement turnkey compliance and security controls for Kubernetes in AWS and Amazon EKS environments.

    This webinar will explore how to extract data required for IT audits and implement network segmentation and encryption to meet your security and compliance requirements. We'll cover the security and compliance challenges that users face when deploying Kubernetes in AWS and Amazon EKS environments

    We'll also present a live demonstration of key capabilities within Tigera Secure Cloud Edition
  • How to Chart Your Route to Cloud Native Recorded: Jun 13 2018 24 mins
    Amit Gupta, VP Product Management, Tigera and Robert Starmer, Cloud Advisor & Founding Partner, Kumulus Technologies
    Join this live Q&A with Amit Gupta, VP Product Management at Tigera, as he provides tips, advice, best practices and industry insights into going cloud native.

    He will answer all of your questions live from DockerCon and help your organization discover why Kubernetes is the #1 container orchestration tool, how it plays a vital role in application security, and how clout native architectures help solve application connectivity problems.
  • Securing Kubernetes Recorded: Jun 13 2018 45 mins
    Robert Starmer, Kumulus Technologes, Amit Gupta, Tigera, Omar Lari, AWS & Susmitha Kanakamedala, Box
    Join this live panel discussion with experts at DockerCon to learn why Kubernetes is the most popular container orchestration tool and why application security is key to your cloud native journey.

    Tune into this interactive Q&A session to hear from Docker, Infrastructure, Cloud and DevOps experts while they discuss the following:

    - How are open source systems like Kubernetes changing the way we deploy, scale and manage applications?
    - How does Kubernetes enable the cloud-native journey?
    - Security best practices for Kubernetes deployment
    - The major tenets of Kubernetes security


    And much more!

    This live panel will be streamed directly from DockerCon 2018 in San Francisco! Join us live from the comfort of your desk.

    Moderated by: Robert Starmer, Cloud Advisor & Founding Partner, Kumulus Technologies
    Panelists: Amit Gupta, VP Product Management, Tigera, Omar Lari, Business Development Manager - Container Services, AWS and Susmitha Kanakamedala, Sr. Software Engineer, Box
  • What Exactly is CNI (Container Network Interface)? Recorded: May 31 2018 35 mins
    Christopher Liljenstolpe, Chief Technical Officer, Solutions
    In this video we will compare CNI to some other well-known orchestration network interfaces (the way the orchestrator asks for network connectivity). We’ll also look at the difference between CNI and the Kubernetes Network Policy Interface. We’ll dive into some detail as to how CNI works and what has recently changed in CNI and what may be in store in the future with Gunjan, one of the CNI contributors.
Zero Trust Network Security & Compliance for Kubernetes Platforms
Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to secure containers and applications with a least privileges model and defense in depth. Tigera’s technology is recognized and trusted as the de facto standard for Kubernetes network security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Leveraging Kubernetes Services & DNS
  • Live at: Dec 19 2018 6:00 pm
  • Presented by: Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera
  • From:
Your email has been sent.
or close