Admission Control: Easily setting policies and guardrails for cluster operations

Logo
Presented by

Alfred Trevino - Cloud Technical Marketing Manager, Check Point

About this talk

In this webinar (presented together with CheckMates) we will see how using Kubernetes Admission Control helps customers move govern all cluster operations using a central admissions controller. Easily set policies and guardrails for cluster operations using intuitive, human readable policy language. Enforce least privileged access rights and ensure that all images come from trusted sources. Here’s what we will discuss during this webinar: • Explanation of Admission Control. • Using the intuitive GSL use case builder. • See how CloudGuard identifies Image Assurance. • See how CloudGuard enforces using Admission Control
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (367)
Subscribers (55678)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.