Operations | Monitoring | ITSM | DevOps | Cloud

Webinar

How to Secure the network of your GKE Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

How to Secure the network of your GKE Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

How Jacada DevOps Integrated Security into Observability

Watch the webinar to hear how Jacada:

  • Leverages open source technology to meet their observability, monitoring and security objectives
  • Deployed Logz.io’s Log Management solution to streamline logging and make it an easy and accessible component of their architecture, alleviating the workload placed upon the shoulders of the DevOps team
  • Relies on Cloud SIEM’s triggered security rules, dashboards and scheduled reports to gain full visibility into their risk environment