<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic White Paper - CLOUDNATIVE SECURITY - Your Guide to Containers / Kubernetes Security in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/White-Paper-CLOUDNATIVE-SECURITY-Your-Guide-to-Containers/m-p/93246#M2171</link>
    <description>&lt;DIV class="page" title="Page 2"&gt;
&lt;DIV class="section"&gt;
&lt;DIV class="layoutArea"&gt;
&lt;DIV class="column"&gt;
&lt;H2&gt;&lt;SPAN&gt;Abstract&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Moving to the cloud is more than a technical transition to new platforms. It’s part &lt;/SPAN&gt;&lt;SPAN&gt;of an &lt;/SPAN&gt;&lt;SPAN&gt;organization’s growth strateg&lt;/SPAN&gt;&lt;SPAN&gt;y, with the transformation digitalizing its operations. It brings new technologies together with new security risks. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This paper helps provide a basic understanding of a modern approach to microservices and container technologies including Kubernetes. It explores the challenges they raise together with possible solutions and introduces the Cloud- Native Security platform. &lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Audience&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;This paper is intended for a technical audience, including security specialists interested in gaining a quick understanding of recent security technological trends, CI/CD pipelines, DevSecOps, containerization, and cloud transformation. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Readers should be familiar with the basic concepts of virtualization, networks, and have a good understanding of security design.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For the full list of White Papers,&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53242#M10603" target="_blank" rel="noopener"&gt;go here&lt;/A&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For the full list of Security Best Practices papers, &lt;A href="https://www.checkpoint.com/architecture/security-best-practices/" target="_self"&gt;refer to this page&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 04 Aug 2020 08:38:55 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2020-08-04T08:38:55Z</dc:date>
    <item>
      <title>White Paper - CLOUDNATIVE SECURITY - Your Guide to Containers / Kubernetes Security</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/White-Paper-CLOUDNATIVE-SECURITY-Your-Guide-to-Containers/m-p/93246#M2171</link>
      <description>&lt;DIV class="page" title="Page 2"&gt;
&lt;DIV class="section"&gt;
&lt;DIV class="layoutArea"&gt;
&lt;DIV class="column"&gt;
&lt;H2&gt;&lt;SPAN&gt;Abstract&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Moving to the cloud is more than a technical transition to new platforms. It’s part &lt;/SPAN&gt;&lt;SPAN&gt;of an &lt;/SPAN&gt;&lt;SPAN&gt;organization’s growth strateg&lt;/SPAN&gt;&lt;SPAN&gt;y, with the transformation digitalizing its operations. It brings new technologies together with new security risks. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This paper helps provide a basic understanding of a modern approach to microservices and container technologies including Kubernetes. It explores the challenges they raise together with possible solutions and introduces the Cloud- Native Security platform. &lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Audience&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;This paper is intended for a technical audience, including security specialists interested in gaining a quick understanding of recent security technological trends, CI/CD pipelines, DevSecOps, containerization, and cloud transformation. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Readers should be familiar with the basic concepts of virtualization, networks, and have a good understanding of security design.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For the full list of White Papers,&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53242#M10603" target="_blank" rel="noopener"&gt;go here&lt;/A&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For the full list of Security Best Practices papers, &lt;A href="https://www.checkpoint.com/architecture/security-best-practices/" target="_self"&gt;refer to this page&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 04 Aug 2020 08:38:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/White-Paper-CLOUDNATIVE-SECURITY-Your-Guide-to-Containers/m-p/93246#M2171</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-08-04T08:38:55Z</dc:date>
    </item>
  </channel>
</rss>

