
In this video, Sam Gabrail, platform engineer and president at TeKanaid, talks about the importance of automated credential rotation.
In this video, Sam Gabrail, platform engineer and president at TeKanaid, talks about the importance of automated credential rotation.
Itzik Alvas and Oded Hareven discuss cybersecurity challenges in enterprises, focusing on the evolving landscape of machine and non-human identities.
Adam Arellano and Oded Hareven discuss cybersecurity challenges in enterprises, the role of machine identities, and the impact of AI on security. Learn why identity is central to modern security strategies and how CISOs can balance tool consolidation with operational efficiency.
James Azar and Oded Hareven discuss the evolving role of cybersecurity in business, the rise of machine identities, and how CISOs can prioritize security investments. Learn why aligning security with business processes is key to reducing risk and improving resilience.
Ross Young and Oded Hareven discuss the rise of machine identities, secrets management, and cybersecurity threats in DevOps and cloud environments. Learn why identity-based attacks are increasing and how organizations can mitigate risks with zero-knowledge security.
Akeyless CEO & Co-founder Oded Hareven and ex-NSA Director Admiral Michael Rogers discuss how compromised identities and credentials fuel breaches and how unifying secrets management into one platform strengthens security while reducing costs and complexity.
Learn about the world's first Unified Secrets & Machine Identity Platform in this 30-minute webinar with Akeyless CEO & Founder Oded Hareven and CMO Suresh Sathyamurthy. You will learn how to: - Tackle Complexity in security operations - Ensure Data Control without compromise - Achieve Full Visibility across environments This session is brief and informative, with important points shared afterward for easy reference. Don’t miss this opportunity to strengthen your security strategy and get your questions about unified secrets and machine identities answered.
Join Chris Gruel, Senior Solutions Architect, for a technical discussion on the important elements of just-in-time (JIT) secrets management to improve security and compliance. You’ll learn: - The benefits of using temporary JIT secrets - Top use cases for when and where to use them - Live walk-through of effective implementation strategies Whether you're just starting in secrets management or want to enhance your existing practices, this webinar will provide you with new knowledge and practical skills to elevate your organization's security framework.
Join us for an insightful webinar with Chris Gruel, Senior Solutions Architect. This webinar will cover the fundamentals and advanced aspects of secret rotation, with a special focus on custom rotated secrets. Learn why secret rotation is crucial, how to implement custom rotations effectively, and the benefits they bring. This session is designed to provide valuable knowledge and practical tools for improving your organization's security posture.
Join our webinar to explore the updated Akeyless Password Manager, powered by Distributed Fragments Cryptography DFC™ technology. This session will demonstrate how Akeyless Password Manager strengthens your security protocols and integrates smoothly with existing secrets management systems. Learn about the specific security advantages of Akeyless DFC™ through a live demo and understand how this tool can fit into your organization’s security stack. Whether you’re looking to improve your password management or seeking a comprehensive security solution, this webinar will provide practical insights and essential knowledge to help protect your organization.
Join IDC Analyst Katie Norton, Akeyless CEO and Co-founder Oded Hareven, and Akeyless CMO Suresh Sathyamurthy for an insightful fireside chat on the crucial role of secrets management in today's cloud-driven enterprises. The panel will discuss key findings from IDC's latest spotlight paper and share expert strategies for effectively securing sensitive information, streamlining secrets management operations, and ensuring compliance through proper secrets governance. Learn why Akeyless's innovative secure SaaS approach to secrets management is gaining traction as a powerful solution for modern enterprises. Don't miss this chance to hear from the experts and stay ahead of the curve in protecting your organization's most valuable assets.
In the rapidly evolving landscape of cloud computing and DevOps, the integration of cutting-edge AI technologies like Large Language Models (LLMs) with Kubernetes deployments represents a significant leap forward. This webinar showcases an innovative approach to automating Kubernetes Helm chart deployments through a LangChain-powered conversational agent, codenamed "Heimdal."