Главная
Study mode:
on
1
Intro
2
A realization
3
The impact of data breaches
4
More data more problems
5
Show hands
6
Security was the problem
7
We are killing people
8
Security
9
Engineers and Operations
10
Precrash Testing
11
Free Crash Check
12
Constant Monitoring
13
The Driver
14
The Han System
15
Fire Resistant Suits
16
Fire Suppression System
Description:
Learn how to enhance security for legacy applications using Docker without modifying their code. Explore techniques to modernize and containerize traditional apps, making them more portable, cost-efficient, and secure. Discover Docker Enterprise Edition's security features, including isolation, encryption, scanning, and signing, to reduce attack surface area and mitigate potential threats. Through live demonstrations, gain insights into implementing various security configurations and responding to incoming threats effectively. Understand the challenges of maintaining critical legacy applications and how containerization can address security concerns while preserving business functionality.

Using Docker to Secure Traditional Applications Without Code Changes

Docker
Add to list