Highlights the importance of protecting the DevOps pipeline and addresses how to protect it. Includes common use cases, as well as essential principles of security policies and workflow management. Also provides an overview of the capabilities and architecture of the Conjur secrets management solution.
CyberArk Conjur automatically secures and manages secrets used by machines and users throughout the DevOps pipeline. This data sheet provides a brief intro to CyberArk Conjur.
Learn about the new features. In this webinar, we highlight the following:
- New automatic privileged account onboarding capabilities
- New threat detection and automatic response enhancements
- New ability to manage local privileged credentials on endpoints that are loosely connected to the network
- New integration that will synchronize secrets that are managed in the Vault with Conjur
Code fast, beat the competition to market, and make more money. This is the value of DevOps, but are you missing a step? Now that developer and operations teams have settled their differences to leverage countless containers, applications, and virtual machines, to move and produce at unprecedented scale and speed, do you still know who has access to these virtual machines and applications? Where are the secrets and credentials stored? Is your continuous CI/CD pipeline continuously secure? How would you know? PwC knows. And by attending this webinar you will learn from PwC’s experience garnered from years of working with clients to help them identify, design and deploy secure DevOps solutions. PwC’s experience in combination CyberArk’s dedication to privileged account security, brings the expertise you need to secure your DevOps pipeline, and stay in compliance without adding roadblocks to DevOps workflows.
Businesses continue to aggressively move to cloud-based infrastructure with Forrester research indicating the public cloud services market will reach $236 billion by 2020.* Increasingly, businesses also leverage DevOps environments, making it ever more critical to secure both cloud workloads and DevOps environments. What are the tools and techniques needed to effectively secure these environments?
After briefly highlighting why securing cloud workloads and CI/CD pipelines are critical, the session will focus on the key approaches and requirements organizations should consider as they prioritize and assess their cloud and DevOps security needs.
Key take-aways include:
- An understanding of cloud and DevOps related vulnerabilities and the importance of secrets management
- Insights on managing IaaS platforms and credentials with a secrets management solution
- The value of a single point of control for hybrid cloud and DevOps environments
- Best practices for deploying Privileged Identity Management for containers and DevOps
Andras Cser, vice president and principal analyst at Forrester Research.
Cser is a leading expert on identity management, access management and privileged identity management.
Chris S. Smith, Product Marketing – Cloud and MSP, CyberArk
Chris is the global product marketing manager for CyberArk’s Cloud and MSP offerings. In this role, he is part of the cross-functional team responsible for ensuring that CyberArk privileged account security products fully protect and secure customers’ applications and other assets running in public and private cloud infrastructure.
*Forrester Research: The Cloud Security Market Grows From $1.5 Billion In 2017 To $3.5 Billion In 2021 by Andras Cser and Jennifer Adams, July 6, 2017