Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How to Use Mirantis Container Runtime to Secure Business-Critical Applications

Mirantis via YouTube

Overview

Discover how to secure business-critical applications using Mirantis Container Runtime in this informative 33-minute webinar. Learn about the importance of a validated cryptographic module for end-to-end encryption and secure mutual TLS authentication. Explore the integration of container runtime with CI/CD pipelines for signed image promotion and vulnerability scanning in conjunction with Mirantis Secure Registry. Gain insights into building a secure software supply chain for both Linux and Windows environments, essential for protecting data in mission-critical settings. Follow along as the presenter explains the DevSecOps approach and provides a comprehensive overview of Mirantis Container Runtime's enterprise features, concluding with a quick recap of key points covered.

Syllabus

- Introducing our presenter
- What this webinar will cover
- The importance of a validated cryptographic module
- Encryption via validated cryptographic module
- DevSecOps approach explained
- Quick recap
- Outro

Taught by

Mirantis

Reviews

Start your review of How to Use Mirantis Container Runtime to Secure Business-Critical Applications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.