ping-centrify-devops-lp-od.jpg

Securing access to the infrastructure, tools, and applications that DevOps teams use, enabling elastic application configuration via secrets, and authenticating applications and services with high confidence and in automated fashion is often counterintuitive to enforcing identity and access management best practices in these types of environments.

Security is often not the main focus for DevOps, as traditional methods of securing developer environments involve manual interventions and restrictive controls that significantly impact the agility of development and operations. Adding to the complexity, non-human identities assigned to machines, APIs, and microservices nowadays represent the majority of “users” in many organizations.

This webinar explores how DevOps owners can layer identity security into their environment without impacting agility, leaving them to focus on what they do best. Our expert speakers discuss best practices to:

  • Protect DevOps infrastructure and CI/CD pipelines from access-related risks by maintaining continuous visibility into identities, their entitlements, and usage.
  • Provide identity independence across on-premises and cloud environments (public or private).
  • Centralize authentication across applications, DevOps tools, and critical workloads.
  • Modernize DevOps application-to-application password management approaches to simplify and centralize credential management.
  • Assure programmatic access with federation authentication.
  • Scale containerized software up/down in minutes to suit your needs.
  • Centralize authentication for all your apps, resources, and critical workloads.

Speaker

Tony Goulding

Tony Goulding
Cybersecurity Evangelist,
Centrify

Andy Smith

Andy Smith
Senior Vice President of Marketing,
Centrify

Loren Russon

Loren Russon
Vice President of Product Management,
Ping Identity