Topics and Themes from Re:Invent

November 19, 2014 Kevin O'Brien


With Re:Invent behind us, we took a step back and looked at the entire set of conversations that we had while on the show floor and attempted to tease out some of the themes, trends, and topics that attracted the most attention.

We’ve posted previously about three of the major themes that drove the most interest and attention from the show in general; it was interesting to see how many of these came out in our booth discussions, as well.

What jumps out at us here are the high number of tool-specific conversations we had. Security, permissions, secrets management, and audit for for Docker and Jenkins were all consistently brought up by visitors to the Conjur booth. As we demonstrated our new user interface and walked through the reporting functionality we’ve created, another major theme — using Conjur for audit and compliance — was brought up by the folks we were talking to.


We expect that creating a strong, audited, security-focused set of permissions and secrets management workflows will be an area of interest, more so now than ever before. Conjur can be used to support a variety of regulatory requirements (HIPAA, SOX, PCI-DSS, FISMA, NIST, and more); in doing so, it allows DevOps and IT teams to create a secure, cross-platform authorization platform that can quickly and comprehensively show all authz events and policy updates.

One other area of special interest coming out of the event was integrating Conjur with Docker. We are addressing this specifically on 11/25, at 1pm EDT – we’ll be doing a live setup of the system, and showing how to move secrets out of Docker containers and into Conjur.

There is still time to register for the session by clicking here.



Previous Article
The Privileged Aspect of the Recent Kerberos Vulnerability
The Privileged Aspect of the Recent Kerberos Vulnerability

By John Worrall A rare, out-of-band patch from Microsoft a couple of weeks ago once again reminds us all th...

Next Article
Cyber Threat Investigators Identify “Signature” of Most Dangerous Cyber Attacks
Cyber Threat Investigators Identify “Signature” of Most Dangerous Cyber Attacks

By John Worrall Organizations are under constant threat of attack, yet few truly understand how they’re bei...

Check out our upcoming webinars!

See Webinars