Minimizing blast radius of chained Kubernetes misconfigurations and image vulnerabilities
Feb 24, 2022
Sign in to watch
Watch this webinar and learn how to:
Monitor cloud providers such as Microsoft Azure®, AWS®, GCP®, OCI and Alibaba Cloud.
Shift security policies from right to left with DevOps pipeline integrations providing feedback to developers.
Enforce microsegmentation for Linux, Windows® and Kubernetes®.
Use various deployment models to defend Linux, Kubernetes, Docker and AWS Fargate®-based workloads.
Employ vulnerability assessment and management capabilities from code depositories to image registries, including Windows, serverless and VMware Tanzu.
Send alert notifications by email and chat using APIs to integrate with third-party tools like Jira®, ServiceNow®, etc.