Applications are increasingly being containerized, and when that happens, they are likely to find their way to a cluster within a container-orchestration system like Kubernetes. However, containerized applications are only as safe as the Kubernetes cluster they run in. So how do you ensure a secure environment? The answer is visibility. In this on-demand webinar, LogRhythm sales engineers join Ultimate Security Windows Host Randy Franklin Smith to introduce you to Kubernetes audit logging. The presenters demonstrate how to use the LogRhythm NextGen SIEM Platform to gain visibility into your Kubernetes clusters. Explore Kubernetes audit logging and learn how to isolate important events to reduce the noise from all other events. Smith provides examples of real Kubernetes audit events to show you audit policies in action. LogRhythm sales engineers build on Smith’s introduction and apply those learnings with security considerations in mind to show you how to: - Ensure you create an approved container image - Ensure the API isn’t open to the outside world - Track inbound and outbound traffic from the cluster and pods - Monitor and visualize container log data

Hora

20:00 - 21:00 hs GMT+1

Organizador

LogRhythm | The Security Intelligence Company
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 766 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Fecha
    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Descripción
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
    Cerrar
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020