Watch on YouTube
Watch on Vimeo
In this demo, we explore best practices for handling sensitive data at the distributed edge and how to safeguard it against potential breaches with Avassa’s edge-native security features. We illustrate what happens when a host running business-critical applications is unexpectedly powered down or even stolen.
Discover how cryptographic materials stored in memory are immediately erased, locking down the secrets management vault and certain event streaming topics. By the end of this video, you’ll understand how Avassa protects sensitive data against security breaches across edge sites, ensuring resilient and secure deployments.
Learn more about security at the edge in this whitepaper: https://info.avassa.io/securing-the-edge
Personnel: Carl Moberg, Fredrik Jansson
Thank you for being part of the Tech Field Day community! Our mailing list is a great way to stay up to date on our events and technical content, and we appreciate your signup.
We promise that we’ll never spam you, send ads, or sell your information. This list will only be used to communicate with our community about our events and content. And we’ll limit it to no more than one message per week.
Although we only need your email address, it would be nice if you provided a little more information to help us get to know you better!