Video

Cilium: A path to Secure Connectivity on Kubernetes

Watch this in-depth discussion with Isovalent, AWS and Redpill Linpro about Zero Trust Security within Kubernetes Networking.

About

Watch this in-depth discussion with Isovalent, AWS and Redpill Linpro on securing Kubernetes connectivity with Cilium. In this video we’ll cover:

  • Kubernetes Security Gaps: Understand why default Kubernetes security isn’t enough. 
  • Top Use Cases: Learn from AWS and Redpill Linpro about key use cases across supply chain and data security. 
  • Cloud Native Standard: See why eBPF, Cilium, and Tetragon are the standard for secure connectivity and deep observability.  


Engage with industry leaders and see real-world use cases, all while discovering practical solutions and tools to enhance your Kubernetes security posture.

 

If you are interested in learning more,  then check out our related content below! 

 

Speakers

Do you have any questions?Contact us

Related Content

Labs

Getting Started with Cilium

Cilium is an open source software for transparently securing the network connectivity between application services deployed using Linux container management platforms like Docker and Kubernetes. At the foundation of Cilium is a new Linux kernel technology called eBPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can be applied and updated without any changes to the application code or container configuration. In this interactive, hands-on lab we provide you a fully fledged Cilium installation on a small cluster and a few challenges to solve. See for yourself how Cilium works and how it can help you by securing a moon-sized battlestation in a “Star Wars”-inspired challenge.

Labs

Isovalent Enterprise for Cilium: Zero Trust Visibility

Creating the right Network Policies can be difficult. In this lab, you will use Hubble metrics to build a Network Policy Verdict dashboard in Grafana showing which flows need to be allowed in your policy approach.

Top Kubernetes Security Use Cases: Tetragon and eBPF for Platform Teams

Discover how Tetragon, powered by eBPF, elevates Kubernetes Security. Learn to seamlessly tie network and process data for deep workload visibility, analyze real-time TCP/UDP metrics, understand enforcement mechanisms in the kernel, and ensure regulatory compliance across frameworks.

Online