×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

DevSecOps: Balance Speed & Agility With Security & Compliance

May 24, 2019

Developers are shifting to a DevOps delivery model to increase the speed of delivering new code and features to the market. But as a security and IT practitioner, you want security-first, enterprise-wide solutions that support your development teams without compromising on security.

This DecOps secrets management webinar explains why it is important to:

  • Secure and manage secrets used by machines and other non-human identities (e.g. micro-services, applications, scripts, CI/CD tools, hosts, etc.) and privileged users throughout the DevOps pipeline.
  • Integrate with the DevOps Toolchain to secure and manage secrets used by CI/CD tools such as Jenkins, Docker, Puppet, Chef, etc. to balance speed and automation while still significantly reducing the threat surface. And to secure containerized platforms such as Red Hat OpenShift, Pivotal, Kubernetes and Docker.
  • Help security and compliance professionals to automatically secure and manage secrets throughout the DevOps pipeline by implementing built-in privileged account best practices across all environments (cloud, on-premises and hybrid environments).


(An open source version of Application Access Manager for DevOps secrets management is available as Conjur Open Source at www.conjur.org).

Previous Video
Privilege Access It is time for a cyber-based and NOT a compliance approach
Privilege Access It is time for a cyber-based and NOT a compliance approach

Privileged Access is a re-occurring theme in Compliance Regulations. Learn how to be in compliance and to r...

Next Video
The CyberArk Privileged Access Security Solution v10 – A simplified way to deploy  integrate and scale
The CyberArk Privileged Access Security Solution v10 – A simplified way to deploy integrate and scale

CyberArk’s Andrew Silberman and Randy Brown review and demonstrate the features and capabilities of CyberAr...