Thursday, 10 May 2018 02:16

CyberArk Conjur Enterprise now available on Red Hat OpenShift Container Platform


Privileged access security vendor CyberArk has announced the availability of CyberArk Conjur Enterprise for Red Hat OpenShift Container Platform, and claims it will simplify secrets management and provide flexibility to securely deploy enterprise apps at scale.

CyberArk claims the shift to a container platform can help simplify DevOps secrets management and aids companies in easily managing and rotating secrets and other credentials.

“Container platforms can offer significant business advantages, and it is important for organisations to think about an approach to security that aligns with the agility and velocity that today’s developers want,” said Chris Morgan, global technology director, OpenShift Partner Ecosystem, Red Hat. “With CyberArk Conjur Enterprise running on Red Hat OpenShift Container Platform, users have more choice for an enterprise-class, scalable secrets management solution that can meet these needs.”

As well as the benefits to developers and operations teams, customers will benefit from a "security first" approach designed to deliver an automated, single point of control for their secrets and credentials across all the environments, cloud and on-premises, supported by Red Hat OpenShift Container Platform, combating the constant problem of fast-moving DevOps environments where SSH keys, API keys, passwords and certificates may often not be well protected.

Conjur Enterprise can also be integrated with CyberArk Enterprise Password Vault, replicating secrets between the two products.

“Securing CI/CD environments and container application platforms can increase enterprise workflow and policy management complexities,” said Adam Bosnian, executive vice-president, global business development, CyberArk. “CyberArk Conjur Enterprise on Red Hat OpenShift Container Platform can offer organisations a solution to simplify the process – enabling them to capitalise on accelerated DevOps processes with the flexibility to deploy in their preferred compute environment, without introducing unnecessary secrets-related risk.”


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.



Recent Comments