Debunking the myths around containers and security

ALREADY REGISTERED?


Even as containers have become the choice for application deployment in most enterprises, concerns persist about their security. There are obvious benefits in being able to package an application and all its dependencies into a single artifact that can be accurately deployed. But some worry that containers are less secure than traditional application deployment models and pose a larger organizational threat. The truth is that containers and immutable infrastructure offer opportunities to enhance security with relatively little additional effort.

In this webinar, we’ll discuss the security concerns and opportunities that come with containers. More specifically:

  • The container security model
  • Building a secure container infrastructure
  • How to create and deploy secure container images
  • Technologies and processes to maintain the security of containerized applications


Now Available On Demand

Speakers

Timothy Hunt

Senior architect, consulting, Red Hat

Timothy Hunt is an emerging technologies practice architect. He has worked with Red Hat® OpenShift Container Platform since its inception. Timothy has deep experience working with large enterprises to design and deploy OpenShift, as well as assisting them with migrating workloads into containers.

CONNECT

Facebook LinkedIn Twitter YouTubeGoogle+

First Name*
Last Name*
Email Address*
Company*
Job Title*
Region*
Country*
State*
ZIP*
Phone*
How would you identify yourself?*
Time Zone

Register now.

Debunking the myths around containers and security

I understand Red Hat often uses authorized business partners to best serve its customers, particularly in the public and education sectors. Red Hat may share my contact information with those partners.*

© Copyright 2017 INXPO, Inc. All rights reserved.