No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Wait Listed
Personal Calendar
Speaking
Conference Event
Meeting
Interest
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
We were unable to load the map image.
This has not yet been assigned to a map.
Search Catalog
Reply
Replies ()
Search
New Post
Microblog
Microblog Thread
Post Reply
Post
Your session timed out.
This web page is not optimized for viewing on a mobile device. Visit this site in a desktop browser to access the full set of features.
Red Hat Summit and DevNation 2016

Secure your enterprise software supply chain with containers

Session Speakers
Session Description

Container images will soon underpin all of our mission critical applications. Therefore, we must ensure that we are using the highest quality containers images at every stage of the development cycle on through to production. In this session, our team of experts from Red Hat, Black Duck and Sonatype will present a foundational understanding of managing container-based software supply chains and how to make them more secure. For example, attendees will learn how to ensure that what gets packaged, delivered, and deployed is of the highest quality -- including using secure configurations and avoiding use of known vulnerabilities in open source components. We will also discuss best practices for accelerating the remediation of security defects in containers that have already been deployed. Attend this session and learn how to:

  • Build and secure enterprise software supply chains with containers.
  • Benefit from use of Red Hat and other open source technologies, including: public registry of trusted sources for container images (e.g., one hosted by Red Hat) and private registries that host certified container images (e.g., Red Hat Satellite, Nexus Repository).
  • How to scale and secure thousands of containers using OpenShift Enterprise by Red Hat or Red Hat Enterprise Linux Atomic Host.
  • Provide the ability to automatically patch and redeploy containers at runtime.
This session is designed to help architects, developers and ops professionals to securely deliver containers for serious production workloads while dealing with the operational challenges of patching and deploying them at scale in an automated manner.


Additional Information
Security
4
Red Hat Summit - Panel
1 hour
Session Schedule