Secrets management for Red Hat OpenShift and Red Hat Ansible Automation Platform

Logo
Presented by

Joe Garcia, DevOps Security Engineer, CyberArk

About this talk

Learn about the benefits of using a centralized security platform with your Red Hat® OpenShift® and Red Hat Ansible® Automation Platform deployments. Through a series of use cases and best practices, you’ll understand both the need and approach for comprehensive privileged access as well as credential and secrets management. Enhance your organization’s security posture for Red Hat OpenShift and Red Hat Ansible Automation Platform environments by using CyberArk’s out-of-the-box certified integrations and by adopting security industry best practices–without slowing developer velocity. This session will provide: - An overview of the CyberArk solutions. - A clear understanding of application, container, and tool security. - A demonstration of the benefits of using CyberArk to supplement the native capabilities of Red Hat OpenShift and Red Hat Ansible Automation Platform. - Why and how to secure credentials for both human users and nonhuman identities. - How to get started with open source and next steps. This session is moderated by Aaron Levey, Head of the Global Partner Security Segment at Red Hat. About the speaker: As a DevOps Security Engineer, Joe Garcia has a strong background in DevOps, cloud, and security. He’s currently focused on helping customers implement and scale effective secrets management solutions. As CyberArk’s subject matter expert in automation, Joe shares CyberArk’s vision of building a security community that is as agile as the automation they are securing in today’s fast-paced environments. This webinar is co-hosted in partnership with CyberArk and Red Hat. As a result, both Red Hat & CyberArk are collecting your personal data when you submit such information as part of the registration process above. For more information on each party’s privacy practices, please see: Red Hat’s Privacy Statement: www.redhat.com/en/about/privacy-policy CyberArk' privacy policy: https://www.cyberark.com/privacy-policy/

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (52)
Subscribers (9676)
The Red Hat® Global ISV Program uses modern delivery methods to support a hybrid cloud strategy to help partners build and run applications on any cloud. This strategic, cloud-native development is built on technologies like Red Hat Enterprise Linux® and Red Hat Openshift® and embodies the best practices of continuous integration and deployment (CI/CD) to help you and your customers succeed in the cloud.