Security solutions for a container-based environment

Logo
Presented by

Gautam Baghel, Solutions Architect for the Alliances, Synopsys

About this talk

Did you know that the 2020 Open Source Security Risk Analysis Report revealed that 99% of audited code bases contained open source, and within those codebases 75% of vulnerabilities were left unpatched? Now more than ever, organizations need to bring development, operations, procurement and security closer together. Doing this can minimize the security, compliance, and code quality risk of open source and other third party software. In this webinar, Synopsys will explore the following: - Security issues and challenges and what can be done to prevent them. - What you should be looking for in security solutions for a container-based environment. - How Synopsys and Red Hat® help you collectively manage your open source components, and associated risks inside container images against security breaches. We will also demonstrate how Black Duck for Red Hat® OpenShift® automatically scans, identifies, and monitors open source components in all container images deployed in Red Hat OpenShift. It performs deep container inspection on both the operating system and application layers to identify open source security, license, and compliance risks. Gautam Baghel joined Synopsys in 2019, and currently serves as a Solutions Architect for the Alliances team on the Synopsys Software Integrity Group, where he leads technical planning, solution development, enablement, and evangelism with strategic partners of Synopsys. When he's not immersed in joint partner solutions, he can be found playing guitar, building or playing video games. This webinar is co-hosted in partnership with Synopsys and Red Hat. As a result, both Red Hat and Synopsys are collecting your personal data when you submit such information as part of the registration process above. For more information on each party’s privacy practices, please see: Red Hat’s Privacy Statement: www.redhat.com/en/about/privacy-policy Synopsys’ privacy policy: www.synopsys.com/company/legal/privacy-policy

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (56)
Subscribers (9473)
The Red Hat® Global ISV Program uses modern delivery methods to support a hybrid cloud strategy to help partners build and run applications on any cloud. This strategic, cloud-native development is built on technologies like Red Hat Enterprise Linux® and Red Hat Openshift® and embodies the best practices of continuous integration and deployment (CI/CD) to help you and your customers succeed in the cloud.