Introducing Teleport 12
0:26 Passwordless Windows Access
1:23 CLI Support for AWS, GCP and Azure
2:07 Database Additions
3:17 Device Trust
0:26 Passwordless Windows Access
1:23 CLI Support for AWS, GCP and Azure
2:07 Database Additions
3:17 Device Trust
After 4 months of hard work we’re proud to announce the release of Teleport version 12! From expanded Windows and Kubernetes support, to a preview of a brand new feature we’re calling Device Trust, Teleport 12 is loaded with improvements and new capabilities that make it easier than ever to securely access your entire infrastructure ecosystem.
"Crunchy on the outside, chewy in the middle". That's how Google described its perimeter-based security targeted high-profile companies such as Google, Adobe, Akamai, Rackspace, etc., with said primary reason of modifying the source codes. In response, Google initiated a perimeter-less and trustless access control system now popularly known as BeyondCorp. BeyondCorp comes from a realization that VPN perimeter network security is obsolete.
CloudCasa by Catalogic and Ondat have joined forces to offer customers a combined solution stack to run and manage stateful applications on Kubernetes and provide best-of-breed performance, availability, data protection and recovery. In this episode of TFiR: Let’s Talk, Swapnil Bhartiya sits down with the executives of both companies, CloudCasa COO Sathya Sankaran and Ondat CEO Richard Olver, to talk about their partnership.
Recent high-profile software supply chain breaches have sharpened the focus on application security. But as cybersecurity professionals know all too well, concern doesn’t always equate to action. In theory, the rise of DevSecOps best practices that shift responsibility for application security further left should reduce the number of vulnerabilities that now routinely make it into production applications. However, real life is a little messier.
As enterprises build and run cloud-native applications on Kubernetes, platform engineering teams are responsible for empowering dozens, hundreds or even thousands of developers to rapidly configure the right infrastructure resources to run mission-critical applications. At the same time, today’s complex threat landscape and strict regulatory environment make it increasingly difficult for developers to configure secure and compliant infrastructure.