+

The Convergence of Cloud, DevOps and Access Control

A webinar with NTT Data Federal and Axiomatics.

The Convergence of Cloud, DevOps and Access Control

Join security experts from industry-leading companies, for a deep dive into migrating access control to the cloud. Our experts will demonstrate and discuss important considerations for technical teams that are necessary to deliver secure solutions while adjusting to strong regulations, access control and authorization strategies. We will demonstrate how to set up a project for containerization using ALFA and Jenkins. Attendees should be familiar with CI/CD, ADS Docker containers and deploying Azure Kubernetes Service.

Attend this webinar and you will :
-Learn best practices for deploying Authorization services in a cloud environment
-Experience in a live demo how a set up in a containerized environment works and its reporting
-Interact with authorization experts from NTT DATA and Axiomatics

Don’t miss the first Episode 1: https://youtu.be/FX1nx_R31Tg

Our Speakers:
Paul Yu, Solutions Architect Manager, NTT DATA
Mike Good, Principal Engineer, NTT DATA
Farid Shahlavi, Principal Engineer, NTT DATA
Mark Berg, Solutions Architect Manager, Axiomatics

Fill out the form below to watch this video

Other Resources

Webinars
Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
Webinars
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Webinars
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.