Home Enterprise Solutions CyberArk Conjur Enterprise now available on Red Hat OpenShift Container Platform

Privileged access security vendor CyberArk has announced the availability of CyberArk Conjur Enterprise for Red Hat OpenShift Container Platform, and claims it will simplify secrets management and provide flexibility to securely deploy enterprise apps at scale.

CyberArk claims the shift to a container platform can help simplify DevOps secrets management and aids companies in easily managing and rotating secrets and other credentials.

“Container platforms can offer significant business advantages, and it is important for organisations to think about an approach to security that aligns with the agility and velocity that today’s developers want,” said Chris Morgan, global technology director, OpenShift Partner Ecosystem, Red Hat. “With CyberArk Conjur Enterprise running on Red Hat OpenShift Container Platform, users have more choice for an enterprise-class, scalable secrets management solution that can meet these needs.”

As well as the benefits to developers and operations teams, customers will benefit from a "security first" approach designed to deliver an automated, single point of control for their secrets and credentials across all the environments, cloud and on-premises, supported by Red Hat OpenShift Container Platform, combating the constant problem of fast-moving DevOps environments where SSH keys, API keys, passwords and certificates may often not be well protected.

Conjur Enterprise can also be integrated with CyberArk Enterprise Password Vault, replicating secrets between the two products.

“Securing CI/CD environments and container application platforms can increase enterprise workflow and policy management complexities,” said Adam Bosnian, executive vice-president, global business development, CyberArk. “CyberArk Conjur Enterprise on Red Hat OpenShift Container Platform can offer organisations a solution to simplify the process – enabling them to capitalise on accelerated DevOps processes with the flexibility to deploy in their preferred compute environment, without introducing unnecessary secrets-related risk.”

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect