<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale


Think About Your Audience Before Choosing a Webinar Title

Sponsored by cyberark

Wednesday, June 24, 2020
1pm EDT

Improve and simplify securing Red Hat OpenShift containerized environments by leveraging CyberArk’s secrets management solutions and out-of-the-box certified integrations. This demo heavy technical session expands on the prior webinar and uses demos and examples to give practical guidance on how to improve securing your organization’s containerized applications. All while avoiding impacting developer velocity.

This session will provide:

  • A clear understanding of the challenges and requirements for securing Kubernetes and Red Hat OpenShift containerized environments at enterprise scale
  • The benefits of enhancing the native secrets management and security capabilities of OpenShift with CyberArk’s certified integrations
  • Guidance to address common security challenges, including achieving enterprise scale and availability, minimizing the time spent on audit and compliance requests, avoiding problems with developer adoption
  • Practical steps to get started using Conjur Open Source and next steps

CyberArk, the global leader in privileged access management, offers the industry’s most complete solution for securing both the credentials and secrets used by applications, Playbooks, scripts and other non-human identities, as well as human users. CyberArk solutions are deployed at many of the world’s largest enterprises including over half the Fortune 500.

Vijay Arungurikai
Senior Solutions Architect - ISV & Embedded Partners, Red Hat
Vijay is a Senior Solutions Architect for Embedded and ISV partners at Red Hat. He has over 21 years of experience designing and building distributed applications using various technologies. He has spent the last four years moving legacy applications to the Cloud and building Cloud-Native applications on the OpenShift Container Platform.
Jody Hunt
Strategic Solutions Engineer - CyberArk
Jody has held diverse technical roles in software development, sales and marketing. He has been an enthusiastic promoter of DevOps principles since 2010. In 2015 he became aware of the growing security gap represented by automation. That led him to Conjur, Inc. in January of 2017, just 4 months before the secrets management company’s acquisition by CyberArk. He graduated the University of Texas at Austin with a BA in Computer Science.

On-Demand Viewing

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.