Follow on Twitter using the following hashtags or usernames: #XFD5
Watch on YouTube
Watch on Vimeo
In today’s presentation we’ll take a guided tour of how service mesh, identity-based access management, and secrets management can help implement Zero Trust without increasing development friction. By combining HashiCorp Boundary, Consul, and Vault, we’ll evaluate how these new workflows affect the development process, and how we’ve secured the architecture.
Personnel: Chris Kent
Watch on YouTube
Watch on Vimeo
In this demo, HashiCorp shows how their Vault solution can simplify machine authentication for applications and devices and ensure proper authorization of users for zero trust networking access to resources.
Personnel: Rosemary Wang
Watch on YouTube
Watch on Vimeo
In this demo, learn how HashiCorp Consul can help secure communications between devices and ensure that machine-to-machine traffic stays secure and prevents lateral movement by potential attackers.
Personnel: Rosemary Wang
Watch on YouTube
Watch on Vimeo
In this demo, learn how HashiCorp Boundary protects the interaction between devices and servers and users that consume them. See how Boundary continues the integrations with other HashiCorp offerings to ensure Zero Trust access to all critical services.
Personnel: Rosemary Wang
Thank you for being part of the Tech Field Day community! Our mailing list is a great way to stay up to date on our events and technical content, and we appreciate your signup.
We promise that we’ll never spam you, send ads, or sell your information. This list will only be used to communicate with our community about our events and content. And we’ll limit it to no more than one message per week.
Although we only need your email address, it would be nice if you provided a little more information to help us get to know you better!