- Видео 143
- Просмотров 66 111
Akeyless Security
Добавлен 2 дек 2020
Akeyless is transforming the landscape of identity security by delivering the world’s first Unified Secrets & Machine Identity Platform, tackling the #1 cause of cybersecurity breaches-compromised identities and secrets. Trusted by Fortune 100 companies and industry leaders, Akeyless provides a cloud-native SaaS solution that simplifies and strengthens how modern enterprises protect their credentials, secrets, and machine identities across all environments.
Backed by leading cybersecurity investors and financial institutions like JVP, Team8, NGP Capital, and Deutsche Bank, Akeyless integrates Vaultless Secrets Management, Certificate Lifecycle Management, Secure Remote Access (Next Gen Privileged Access Management), and Encryption Key Management into one cohesive platform. Our unified approach enables businesses to securely manage the lifecycle of all their secrets and machine identities while maintaining robust, scalable security in hybrid and multi-cloud environments.
Backed by leading cybersecurity investors and financial institutions like JVP, Team8, NGP Capital, and Deutsche Bank, Akeyless integrates Vaultless Secrets Management, Certificate Lifecycle Management, Secure Remote Access (Next Gen Privileged Access Management), and Encryption Key Management into one cohesive platform. Our unified approach enables businesses to securely manage the lifecycle of all their secrets and machine identities while maintaining robust, scalable security in hybrid and multi-cloud environments.
Fireside Chat: James Azar CISO at AP4 & Oded Hareven Akeyless CEO
In this episode of Fireside Chat with Akeyless, Oded Hareven, CEO of Akeyless, sits down with James Azar, the CISO of AP4 and host of the CyberHub Podcast, for an insightful conversation on the evolving role of cybersecurity leadership.
Discover how to:
Map security strategies to business processes for better prioritization.
Overcome challenges in machine identity and secrets management.
Balance best-in-breed vs. best-in-suite solutions in a complex cybersecurity landscape.
Implement staged deployments for maximum efficiency.
Drive meaningful conversations about revenue, risk, and resilience in the boardroom.
With real-world examples from James’ extensive experience, including his innovative app...
Discover how to:
Map security strategies to business processes for better prioritization.
Overcome challenges in machine identity and secrets management.
Balance best-in-breed vs. best-in-suite solutions in a complex cybersecurity landscape.
Implement staged deployments for maximum efficiency.
Drive meaningful conversations about revenue, risk, and resilience in the boardroom.
With real-world examples from James’ extensive experience, including his innovative app...
Просмотров: 112
Видео
Fireside Chat: Adam Arellano Global CISO & Oded Hareven Akeyless CEO
Просмотров 126Месяц назад
Join Adam Arellano (Technology Advisor, Traceable | Global CISO) and Oded Hareven (CEO & Co-founder, Akeyless) as they dive into the future of cybersecurity. Discover the significance of tool consolidation, identity management, and the transformative role of AI in security. Benefits of consolidating security tools to a single vendor vs. multiple point solutions. Key areas of savings when consol...
Fireside Chat: Oded Hareven Akeyless CEO & Ross Young, former CISO of Caterpillar Financial
Просмотров 6402 месяца назад
Join Oded Hareven, CEO and co-founder of Akeyless, in an insightful fireside chat with Ross Young, former CISO of Caterpillar Financial. Dive into a focused discussion on contemporary security challenges and solutions. 00:00 Identity is increasingly central in cybersecurity strategies. 05:30 DevOps boosts efficiency; poses security risks. 06:31 DevOps automates provisioning, CI/CD, infrastructu...
Oded Hareven, CEO & Co-founder of Akeyless Security and Adm. Michael Rogers (Trailer)
Просмотров 4693 месяца назад
Akeyless CEO & Co-founder Oded Hareven and ex-NSA Director Admiral Michael Rogers discuss how compromised identities and credentials fuel breaches and how unifying secrets management into one platform strengthens security while reducing costs and complexity.
Oded Hareven, CEO & Co-founder of Akeyless Security and Adm. Michael Rogers (Full)
Просмотров 3953 месяца назад
Akeyless Executive conversations - Join Admiral Mike Rogers and Oded Hareven as they delve into the evolving challenges and solutions in the world of cybersecurity. From increasing complexity to the need for unifying machine identity management, this discussion covers essential aspects for defending against cyber threats.
Oded Hareven, CEO & Co-founder of Akeyless Security and Adm. Michael Rogers (Short)
Просмотров 1933 месяца назад
Akeyless Executive conversations - Join Admiral Mike Rogers and Oded Hareven as they delve into the evolving challenges and solutions in the world of cybersecurity. From increasing complexity to the need for unifying machine identity management, this discussion covers essential aspects for defending against cyber threats.
NYSE TV interview: Oded Hareven, co-founder and CEO of Akeyless Security.
Просмотров 1183 месяца назад
☁ As organizations shift to cloud-native environments, robust secrets management becomes critical. In a recent episode of "Taking Stock," Trinity Chavez, Lead Anchor of NYSE TV, interviews Oded Hareven, co-founder and CEO of Akeyless Security. Oded discusses how machines, now more numerous than employees, hold secrets that need protection. He explains how Akeyless Distributed Fragments Cryptogr...
Creating and Configuring Targets
Просмотров 1083 месяца назад
In this video, you will learn about Targets in Akeyless as well as how to create them using the CLI and console.
Role-Based Access Control (with API Key Authentication)
Просмотров 2175 месяцев назад
In this video, you will learn about Akeyless' role-based access mechanism and how it works as well as get a quick demo how to use it for Akeyless end-user access.
Authentication Methods and API Key Authentication
Просмотров 2975 месяцев назад
In this video, you will learn how Authentication Methods work as well as how to create a basic API Key for authentication with Akeyless.
Certificate Issuance, Provisioning, and Storage
Просмотров 1035 месяцев назад
In this video, we show how to use Akeyless with public Certificate Authority ZeroSSL to automatically issue, store, and provision TLS certificates.
The CISO's Guide to Secrets Management
Просмотров 646 месяцев назад
The CISO’s Guide to Secrets Management gets to the heart of the secrets management crisis. As a CISO you are facing an unprecedented challenge. Businesses are rapidly migrating to multicloud environments making the task of safeguarding digital assets increasingly complex. The protection of "secrets" - privileged credentials, encryption keys, and certificates are emerging as a critical concern.
Hey DevOps! Looking for information on managing secrets?
Просмотров 416 месяцев назад
Hey DevOps, DevSecOps, Platform Teams! Looking for information on Secrets Management? We've got you! Go to www.akeyless.io/resources/ The #1 place online to learn how to manage your secrets and machine identities! Auto rotating secrets? Dynamic secrets? Just-in-time secrets? Certificate lifecycle management? Encryption-as-a-service? Kubernetes secrets? Managing secrets tutorials? Solving Secret...
About Akeyless Security
Просмотров 5806 месяцев назад
Meet the visionary minds behind Akeyless Security and Vaultless Secrets Management in our About Us video. Join CEO and Co-Founder Oded Hareven, President and Co-Founder Shai Onn, CTO and Co-Founder Refeal Angel, SVP of R&D Ori Mankali, VP of Customer Success Asaf Waizman, VP of Sales Gary Fischer, VP of HR Orly Boim and CMO Suresh Sathymurthy Michael Blackwell, COO Sarah Chen, and CTO David Lee...
Creating and Updating a Static Secret
Просмотров 2807 месяцев назад
In this video, you will learn what a static secret is as well as how to create, read, and update them via the console and CLI.
Technical Overview and Concepts in Akeyless
Просмотров 5087 месяцев назад
Technical Overview and Concepts in Akeyless
Introduction to Akeyless Vaultless Platform
Просмотров 5347 месяцев назад
Introduction to Akeyless Vaultless Platform
Akeyless as an OIDC Identity Provider
Просмотров 638 месяцев назад
Akeyless as an OIDC Identity Provider
Understanding Audit Logs, Analytics, and Usage Reports
Просмотров 998 месяцев назад
Understanding Audit Logs, Analytics, and Usage Reports
Migrating Kubernetes Secrets into Akeyless
Просмотров 518 месяцев назад
Migrating Kubernetes Secrets into Akeyless
Migrating AWS and HashiCorp Vault Secrets into Akeyless
Просмотров 1138 месяцев назад
Migrating AWS and HashiCorp Vault Secrets into Akeyless
Configuring Keyless SSH with Certificates
Просмотров 1778 месяцев назад
Configuring Keyless SSH with Certificates
Accessing a Database via the CLI through Remote Access
Просмотров 328 месяцев назад
Accessing a Database via the CLI through Remote Access
Accessing a Database from the Secure Remote Access Portal with a Dynamic Secret
Просмотров 398 месяцев назад
Accessing a Database from the Secure Remote Access Portal with a Dynamic Secret
Install and Configure the Akeyless Remote Access Bastion
Просмотров 1428 месяцев назад
Install and Configure the Akeyless Remote Access Bastion
Creating and Using a Tokenizer to Encrypt Sensitive Data
Просмотров 968 месяцев назад
Creating and Using a Tokenizer to Encrypt Sensitive Data
Multi-Cloud KMS with Classic Keys and BYOK
Просмотров 658 месяцев назад
Multi-Cloud KMS with Classic Keys and BYOK
Creating and Rotating Encryption Keys
Просмотров 1968 месяцев назад
Creating and Rotating Encryption Keys
3X. 💯💯💯. 🔑🔑🔑🚔🛸🌐🎧⛔️🔐✨️✨️✨️✨️✨️✨️✨️✨️✨️✨️✋️♾️🫰🏻 3X. 💯💯💯. 🔑🔑🔑🚔🛸🌐🎧⛔️🔐✨️✨️✨️✨️✨️✨️✨️✨️✨️✨️✋️♾️🫰🏻 3X. 💯💯💯. 🔑🔑🔑🚔🛸🌐🎧⛔️🔐✨️✨️✨️✨️✨️✨️✨️✨️✨️✨️✋️♾️🫰🏻
🥲
Amiral Rogers, could you explain to me what the purpose of this war in Ukraine is? In my opinion, Russia will achieve its goal. The fight for the domination of superpowers is at the cost of human lives.
Excellent ! Exactly the format that is required for getting the basic concepts across. Jeremy, could you perhaps elaborate a bit more on the secure remote accesses audit capabilities and relate that to PAM concepts? With PAM I mean all three meaning (Privileged Account Management, Privileged Access Management and Privileged Activity Monitoring aka UEBA). Best regards, Steffen
Thanks, Steffen. This is meant to be a Secrets Management concepts video. In the future, we will create an SRA overview video as well as others.
@@Akeyless Perfect 🙂
My. Dalar
Any validity period for this key?
Which key are you referring to? If you mean the Dynamic Secret, yes, you can choose the validity period (TTL) for the temporary credentials.
Fantastically said.
Excellent 👍
🎉 'promosm'
Was that Oded on the drums?
Yes it was! He's an excellent drummer!
PЯӨMӨƧM 😉
Just like you at the present time, America needs a President you have knowledge, you have the gift of sharing it, you are distinguished by your unique intelligence through diplomacy, you would be liked and respected a lot in the world
great presentation
Thank you for having me Jeremy! A fun chat as always 🤗
P𝐫O𝕞O𝓢m 💦
Good stuff
Thank you for this amazing opportunity to speak and learn from all the best in the industry!
Amazing! 👏🏻👏🏻👏🏻
Great presentation. The best!
Fantastic event and amazing team! Go Akeyless!!