Главная
Study mode:
on
1
Intro
2
How Containers help secure the Digital Enterprise
3
IT must evolve All businesses must become software companies
4
New Success Metrics for the CIO
5
Agility
6
Customer satisfaction
7
Infrastructure for the digital business
8
What containers deliver
9
Confidence to Deliver
10
Security is Top Priority and Challenge
11
Top Breaches 2015
12
Security Drives Disconnect Between Dev and Ops
13
Security Is About Managing Risk
14
Start with Security Fundamentals
15
Traditional Strategies Under Pressure
16
Managing your Applications What (who) do you trust?
17
Enterprise Scale Keeping up-standardize (components) and automate
18
Enabling Autonomy Diversity. Responsibilities change.
19
Decompose Applications Complexity becomes an analytics problem
20
Operational Model for the Enterprise
21
One Operational Model Any Application, Anywhere
22
Containerized Application Platform
23
Abstract Across Hybrid Infrastructure
24
Infrastructure Security Dependencies
25
Platform Manages Security
26
Open Content Ecosystem
27
OpenShift Container Platform
28
Dynamic Trust
29
Red Hat Container Certification UNTRUSTED
30
Deployment Automation
31
Eternal Spiral Of Change
32
Containers enable Autonomy And reduce attack surface
33
What's Wrong With VMs?
34
Rethinking Security Strategy
Description:
Explore container security realities and best practices in this comprehensive 56-minute talk by a Red Hat container expert. Learn how enterprise IT can leverage containers to boost business agility, implement DevOps processes, and enhance security and control. Discover the security and performance implications of container-based operating systems, images, and registries. Gain insights into managing container lifecycles, addressing security issues, and adapting to changing functional requirements. Understand how to integrate container infrastructure management with existing systems. Delve into topics such as digital enterprise security, evolving IT landscapes, agility metrics, risk management, application trust, enterprise-scale standardization, and the operational model for containerized applications. Debunk container myths and misperceptions while gaining a clear understanding of how containers can transform your organization's approach to application development and deployment.

Container Security Reality Check - The Container Is Only the Beginning

Red Hat
Add to list