Joint webinar with Red Hat shows how to simplify and enhance the security of OpenShift and Ansible environments by leveraging CyberArk’s out-of-the-box certified integrations.
The session explains the CyberArk solutions for both OpenShift and Ansible and includes demos for Ansible. The session also highlights how to leverage and adopt security industry best practices while avoiding impacting developer velocity, including why it’s a best practice to supplement the native secrets management capabilities of OpenShift and Ansible with a centralized platform.
Note, for a demo heavy webinar on OpenShift, also see the follow-on webinar: Securing Red Hat OpenShift Containerized Applications At Enterprise Scale.
Recommended for You

If you’ve never celebrated the Epiphany (or Mardi Gras in Louisiana), you have likely missed out on the tradition of the King Cake. It’s a coffee cake-type pastry with a small figurine baked...

The SolarWinds digital supply chain attack began by compromising the “heart” of the CI/CD pipeline and successfully changing application code. It highlighted the major challenges organizations...
CyberArk Secrets Manager secures secrets and credentials used by the broadest range of applications in hybrid, cloud-native and containerized environments.

Our modern world is built on vast interconnected systems of network devices. Within an organization, networks keep everyone and everything connected and up and running. To maintain a strong...
A top insurance company makes a digital transformation and secures mission-critical applications running on Red Hat OpenShift using CyberArk Application Access Manager’s secrets management solution.

Microservices and containerized approaches are becoming increasingly critical elements of digital transformation strategies. Container platforms offer developers and operations teams a simplified...

Over the past few years, IT teams have embraced automation as a powerful tool to eliminate repetitive tasks, improve efficiency and consistency, and boost productivity and collaboration. The...

Cyber attackers are hitting organizations from every angle — and, increasingly, from inside. According to a 2020 Ponemon Institute study, the frequency of insider threat incidents spiked by 47%...

Episode #3 features Joe Garcia, our DevOps & Automation Expert on REST API for CyberArk CorePAS; how customers use them and how to get started.

A recent survey of technology executives at large firms showed that Microsoft Azure continues to be the most popular provider of public cloud services, even as Amazon leads the market overall in...

Once again we are seeing how vulnerable and easily development environments can be exploited with the recent news of a massive trove of leaked code from 50+ enterprises across multiple industries,...

“Identity truly is the new perimeter” was one of the big topics at Impact Live. This is because organizations are dealing with a new set of operational and security challenges related to...

Operational Technology (OT) – the hardware and software that’s used to monitor, detect and control changes to devices, processors and events of industrial equipment are popular targets for cyber...

On July 21 and 22, CyberArk will host Impact Live, a virtual version of CyberArk Impact – the premier event for privileged access management (PAM) and identity and access management (IAM)...

Joint webinar with Red Hat shows how to simplify and enhance the security of OpenShift using CyberArk’s secrets management solution. Demos highlight the four main approaches developers can use.

3 minute animation highlights how the CyberArk and Red Hat OpenShift and Ansible integrations simplify how developers can improve the security of containerized environments and automation playbooks.

As a security professional, you’re busier than ever, juggling work, life and everything in between. With convenience being of the utmost importance to us these days, we are excited to launch The...

It’s well-known in the world of cybersecurity that you can’t secure what you don’t know exists. With today’s evolving threat landscape, it’s never been more of a challenge or a necessity to be...

Executive Summary As more and more business is conducted from remote locations, attackers are focusing their efforts on exploiting the key technologies – like Zoom and Microsoft Teams – that...

“Every battle is won before it is fought” ― Sun Tzu, The Art of War The Art of War, Chinese Philosopher Sun Tzu’s treatise on military strategy, is one of the most influential texts in modern...