OpenShift container adoption: security

Logo
Presented by

Tomas Gonzalez, Synopsys | Vijay Arungurikai, Red Hat

About this talk

There are a number of misconceptions circulating about container security. The most common misconception is that, since your applications are in containers, they are totally secure. In reality, applications are your biggest attack surface—and that risk is present in every single layer of the stack. Learn more about debunking container security myths in this resource. This webinar is co-hosted in partnership with Synopsys and Red Hat. As a result, both Red Hat and Synopsys are collecting your personal data when you submit such information as part of the registration process above. For more information on each party’s privacy practices, please see: Red Hat’s Privacy Statement: www.redhat.com/en/about/privacy-policy Synopsys' privacy policy: www.synopsys.com/company/legal/privacy-policy

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (61)
Subscribers (9327)
The Red Hat® Global ISV Program uses modern delivery methods to support a hybrid cloud strategy to help partners build and run applications on any cloud. This strategic, cloud-native development is built on technologies like Red Hat Enterprise Linux® and Red Hat Openshift® and embodies the best practices of continuous integration and deployment (CI/CD) to help you and your customers succeed in the cloud.