<img src="https://certify.alexametrics.com/atrk.gif?account=8w5fq1Fx9f207i" style="display:none" height="1" width="1" alt="">
Best Practices to Secure Containerized Apps with Next-Gen WAF


Think About Your Audience Before Choosing a Webinar Title

Sponsored by Signal Sciences

Monday, March 9, 2020
1pm EST

The rise of microservices, powered by Kubernetes and service mesh, enables companies to rapidly deploy distributed, scalable apps. Distributed applications bring about a significant security challenge: the need to inspect the network traffic that microservices generate and block malicious requests.

Istio, a Kubernetes service mesh provider, offers a varied feature set including a wide array of traffic management controls. Envoy Proxy is an open-source edge and service network proxy which helps organizations achieve greater scale by moving from monolithic to microservices-based architectures. But moving fast to iterate your codebase increases security risk.

In this webinar, Doug Coburn, Director of Professional Services, will walk you through how a next-gen WAF like Signal Sciences can protect containerized apps that leverage cloud-native frameworks. He’ll also show how security teams can gain the visibility required to inspect east-west traffic between the services that power distributed modern applications. 

Attendees will learn:

  • Best practices for securing containerized apps,
  • Common Kubernetes, Istio, and Envoy cloud-native deployment patterns,
  • Why inspecting east-west traffic is crucial to securing your Kubernetes clusters,
  • How to gain layer 7 visibility into web requests between microservices.
Doug Coburn
Director of Professional Services - Signal Sciences
Doug leads the team that installs Signal Sciences in customers’ environments. Prior to Signal Sciences Doug entered the IaaS/PaaS/FaaS world with Iron.io doing Serverless Functions as a Service leading the Sales Engineering team. With Iron.io he got introduced to many of the cloud and PaaS platforms that make up the Serverless landscape. Before the Security and Serverless spaces Doug also worked with companies like Okta, Moka5, and IBM/BigFix that had elements of security, endpoint management, and identity management.

On-Demand Viewing

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.