Follow on Twitter using the following hashtags or usernames: #XFD8
Watch on YouTube
Watch on Vimeo
HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. In this presentation, Megan LaFlamme, Director, Product Marketing, will introduce HashiCorp’s approach to zero trust security with identity-based access and authorization.
Personnel: Megan LaFlamme
Watch on YouTube
Watch on Vimeo
HashiCorp Vault provides the foundation for modern multi-cloud security. It was purpose-built in the cloud era to authenticate and access different clouds, systems, and endpoints, and centrally store, access, and deploy secrets (API keys, credentials, etc.). It also provides a simple workflow to encrypt data in flight and at rest. In this presentation HashiCorp Developer Advocate, Rob Barnes will demonstrate how Vault’s machine authentication and authorization capabilities are a key pillar of zero trust security.
Personnel: Rob Barnes
Watch on YouTube
Watch on Vimeo
HashiCorp Consul enforces authentication between applications by ensuring only the right machines are talking to each other. Consul codifies authorization and traffic rules with encrypted traffic while automating identity-based access for maximum scale, efficiency, and security. With Consul, organizations can discover services, automate network configurations, and enable secure connectivity across any cloud or runtime using service mesh. Rob Barnes, Developer Advocate at HashiCorp will demo how Consul enables machine-to-machine access as a key pillar of zero trust security.
Personnel: Rob Barnes
Watch on YouTube
Watch on Vimeo
HashiCorp Boundary is a secure remote access solution that provides an easy way to allow access to applications and critical systems with fine-grained authorizations based on trusted identities. In this presentation, Rob Barnes will demo how HashiCorp Boundary secures access to applications and critical systems with fine-grained authorizations that don’t require managing credentials or exposing your entire network.
Personnel: Rob Barnes
Thank you for being part of the Tech Field Day community! Our mailing list is a great way to stay up to date on our events and technical content, and we appreciate your signup.
We promise that we’ll never spam you, send ads, or sell your information. This list will only be used to communicate with our community about our events and content. And we’ll limit it to no more than one message per week.
Although we only need your email address, it would be nice if you provided a little more information to help us get to know you better!