Kubernetes Threat Vectors and Prevention

Jun 
23rd
Join Us
Text goes here
X
Register Now
Text goes here
X
About

Kubernetes Threat Vectors and Prevention

08
/
30
 – 
08
/
31
Register
Text goes here
X




Recent security events have highlighted the correlation between poor infrastructure and application visibility with increased network complexity and lack of automation. The versatility and availability of public-cloud offerings allow development and operations teams to create and update resources on-demand. In a matter of minutes, your organisation can create, remove, or modify virtual machine and container workloads, storage, databases, and user access. Organisations often struggle with limited levels of visibility of their network traffic, users, apps, services, and databases, leaving them vulnerable on many levels. To start, the complexity of some public-cloud resource settings creates hidden security risks. These risks can be amplified when you are deploying several new cloud services or updating existing resources.


According to Unit 42 The 2022 State of Cloud Native Security Report, "throughout the pandemic, there were significant expansions of cloud workloads overall, jumping to an average of 59% of workloads hosted in the cloud, up from an average of 46% in 2020. In addition, 69% of organisations host more than half of their workloads in the cloud, up from just 31%...in 2020." As a result, containerised applications hosted in Kubernetes are becoming mainstream. Depending on the application architecture, you can use microservices for small tasks where you create and subsequently destroy the microservices in a very brief amount of time. It is challenging to manage resources in this dynamic environment, so adding clarity across all the steps in the full application development lifecycle is necessary to ensure security and compliance. Automating this process is often the key to providing continuous visibility.


So are you planning to use Kubernetes to build your cloud native application? That's a smart idea, as the benefits they offer for network, runtime, register, orchestration and operating system security are time-and-labor savers appreciated by cloud native application developers.But how beneficial any emerging architecture is, cloud native apps only add value if they're secured, meaning that all components of the vast container environment you implement will need prevention.Join us for a Kubernetes security session focused on the top threats and countermeasures.

Speakers

Fulya Sengil

Prisma Cloud Solutions Architect

Piotr Jablonski

Prisma Cloud Solutions Architect

Thank You

[confirmation_headline]
[confirmation_messaging]




Recent security events have highlighted the correlation between poor infrastructure and application visibility with increased network complexity and lack of automation. The versatility and availability of public-cloud offerings allow development and operations teams to create and update resources on-demand. In a matter of minutes, your organisation can create, remove, or modify virtual machine and container workloads, storage, databases, and user access. Organisations often struggle with limited levels of visibility of their network traffic, users, apps, services, and databases, leaving them vulnerable on many levels. To start, the complexity of some public-cloud resource settings creates hidden security risks. These risks can be amplified when you are deploying several new cloud services or updating existing resources.


According to Unit 42 The 2022 State of Cloud Native Security Report, "throughout the pandemic, there were significant expansions of cloud workloads overall, jumping to an average of 59% of workloads hosted in the cloud, up from an average of 46% in 2020. In addition, 69% of organisations host more than half of their workloads in the cloud, up from just 31%...in 2020." As a result, containerised applications hosted in Kubernetes are becoming mainstream. Depending on the application architecture, you can use microservices for small tasks where you create and subsequently destroy the microservices in a very brief amount of time. It is challenging to manage resources in this dynamic environment, so adding clarity across all the steps in the full application development lifecycle is necessary to ensure security and compliance. Automating this process is often the key to providing continuous visibility.


So are you planning to use Kubernetes to build your cloud native application? That's a smart idea, as the benefits they offer for network, runtime, register, orchestration and operating system security are time-and-labor savers appreciated by cloud native application developers.But how beneficial any emerging architecture is, cloud native apps only add value if they're secured, meaning that all components of the vast container environment you implement will need prevention.Join us for a Kubernetes security session focused on the top threats and countermeasures.

PSE Associate Platform Prep and Online Testing

We look forward to seeing you in

The Final Countdown!
Time left for the event days hours minutes seconds
The countdown doesn't work if the event start date is set to TBD

PSE Associate Platform Prep and Online Testing

Palo Alto Networks
Register now
Text goes here
X
About

Copyright © 2023 Palo Alto Networks. All rights reserved

Privacy
Text goes here
X
Contact Us
Text goes here
X
Terms of Use
Text goes here
X
Link Text
Text goes here
X

Self-parking validation tickets available at event registration upon check-in

Registration is complimentary for all attendees. Justification Letter for Cloud Security Summit. Palo Alto Networks, Inc.'s internal policies strictly limit the types of amenities it can provide to federal, state and local government, and education customers. These policies are in place to ensure that all business sectors are undertaken with the utmost respect to the applicable laws and regulations surrounding the provision of amenities to those customers. By accepting any item of value in connection with this event, you are specifically representing that Palo Alto Networks' offering and your acceptance of it is in copmliance with your organizations' legal and ethical guidelines. This event is not open to K-12 or Library customers. Should you ahve any questions in regard to this event, please contact your Palo Alto Networks sales representative.

Share with Friends
Facebook
Twitter
LinkedIn
Link
CONTACT THE ORGANIZER
Google   Outlook   iCal   Yahoo

RSVP

Google Icon
Google
Outlook Icon
Outlook
Apple Icon
Apple
Yahoo Icon
Yahoo