Webinar: How to Get Unified Security and Monitoring for EKS Deployments
Join this session to learn about how Kubernetes Audit log can be utilized to enhance the security of Kubernetes based deployments.
Learn how to run automated cluster hygiene checks with Alcide Kubernetes Advisor, as part of your pipeline.
Integrating automated AKS security checks into your pipeline can ease the DevOps life a great deal. Learn how to implement, in only 5 minutes, the Alcide Kubernetes Advisor, a DevOps security tool that integrates into your Azure DevOps pipeline and works for you.
Kubernetes has become the default way for many organizations to scale and orchestrate their use of containers. However, organizations are starting to find themselves needing to take the necessary steps to protect their containers. Automating security checks throughout the development life cycle can help reduce risk and allow organizations to develop and deploy securely.
In this webinar, we will explore and discuss everything related to managing and securing Kubernetes clusters. We will introduce a new approach to deploy Serverless Containers in a "Nodeless" cluster and discuss some of the best practices in identifying cluster resource weaknesses and misconfigurations and how to avoid them.
What are the basic security features that Istio provides
How to manage and restrict traffic to external services with Kubernetes network policy and Istio network policy
How to spot security anomalies
Interesting use cases
Explore Kubernetes network policies, workload segmentation, and what it can and can't provide. We will dive in to how Kubernetes service discovery can be used to bypass network policies.
Our webinar will focus on how to gain a deeper understanding of using Istio for monitoring tasks while using Istio security features to secure your microservices and spot security anomalies.
Subscribe to receive email updates