Thursday, 10 May 2018 02:16

CyberArk Conjur Enterprise now available on Red Hat OpenShift Container Platform

By

Privileged access security vendor CyberArk has announced the availability of CyberArk Conjur Enterprise for Red Hat OpenShift Container Platform, and claims it will simplify secrets management and provide flexibility to securely deploy enterprise apps at scale.

CyberArk claims the shift to a container platform can help simplify DevOps secrets management and aids companies in easily managing and rotating secrets and other credentials.

“Container platforms can offer significant business advantages, and it is important for organisations to think about an approach to security that aligns with the agility and velocity that today’s developers want,” said Chris Morgan, global technology director, OpenShift Partner Ecosystem, Red Hat. “With CyberArk Conjur Enterprise running on Red Hat OpenShift Container Platform, users have more choice for an enterprise-class, scalable secrets management solution that can meet these needs.”

As well as the benefits to developers and operations teams, customers will benefit from a "security first" approach designed to deliver an automated, single point of control for their secrets and credentials across all the environments, cloud and on-premises, supported by Red Hat OpenShift Container Platform, combating the constant problem of fast-moving DevOps environments where SSH keys, API keys, passwords and certificates may often not be well protected.

Conjur Enterprise can also be integrated with CyberArk Enterprise Password Vault, replicating secrets between the two products.

“Securing CI/CD environments and container application platforms can increase enterprise workflow and policy management complexities,” said Adam Bosnian, executive vice-president, global business development, CyberArk. “CyberArk Conjur Enterprise on Red Hat OpenShift Container Platform can offer organisations a solution to simplify the process – enabling them to capitalise on accelerated DevOps processes with the flexibility to deploy in their preferred compute environment, without introducing unnecessary secrets-related risk.”

DIGITAL MARKETING HAS NO SOCIAL DISTANCING OR TRAVEL RESTRICTIONS

As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email andrew.matler@itwire.com

CONTACT US!

LAYER 1 ENCRIPTION A KEY TO CYBER-SECURITY SOLUTION

Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.

DOWNLOAD!

David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments