Securing the contents of your containers

ALREADY REGISTERED?


You want to be sure that the contents of your containers are secure. Having an insecure automated supply chain can introduce vulnerabilities. Having the ability to independently define a security policy for any image in your OpenShift environment, and flag any images in violation of that policy, is valuable.

Creating applications from a default template, or by obtaining a template from an application owner, or by creating your application from source abstracts many of the security decisions from application owners. As a result, the container images have a clear security story that starts with an understanding of their origin.

Join this webinar to learn how Red Hat® OpenShift Container Platform, with its Red Hat Container Catalog, can help with secure images. We'll also discuss:

  • Automatically scan ImageStreams for security vulnerabilities.
  • Proactively monitor for vulnerability disclosures.
  • Identify security issues within the software supply chain.
  • Gate deployments based on policy.


Now Available On Demand

Speakers

Kirsten Newcomer

Manager, Portfolio & Solutions Security Marketing Red Hat


Kirsten Newcomer, Red Hat manager of Portfolio & Solutions Security Marketing, works closely with Red Hat security professionals across Red Hat products. Kirsten is a diversified software management professional with more than 15 years of experience in application development and infrastructure solutions. Prior to joining Red Hat, Kirsten provided strategic direction for Black Duck’s open source security and governance solutions. Her career has spanned roles at IBM Software Group, Rational Software, and BMC Software. She is an active member of the Linux® Foundation's Software Package Data Exchange (SPDX) working group.

CONNECT

Facebook LinkedIn Twitter YouTubeGoogle+

First Name*
Last Name*
Email Address*
Company*
Job Title*
Region*
Country*
State*
ZIP*
Phone*
How would you identify yourself?*
Time Zone

Register now.

Securing the contents of your containers

I understand Red Hat often uses authorized business partners to best serve its customers, particularly in the public and education sectors. Red Hat may share my contact information with those partners.*

© Copyright 2017 INXPO, Inc. All rights reserved.