How can you secure access to diverse infrastructure components, from bare metal to ephemeral containers, consistently and simply? In this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces.
Conference
Teleport Connect Virtual 2022
Revisit all the content from our first-ever user conference presented by fellow engineers, industry peers, and Teleport users.
Webinar
Introduction to Teleport
In this session, Phil and Alex introduce you to to Teleport's Certificate Authority and Access Platform for your infrastructure.
Webinar
5 Key Steps to Securing a Default Kubernetes Cluster
This talk covers the default insecurities in a Kubernetes cluster and 5 practical implementations to secure it.
Hot Take
Hot Takes Episode 1
This Month's Hot Take: Five renowned experts from the Kubernetes community will be discussing how human-error is the most significant threat to the security of your infrastructure, NOT hackers and ransomware.
Watch Hot Take
Tech Paper
Kubernetes in the Enterprise
Download this resource to learn about 2023 trends surrounding the current state of Kubernetes, including scalability, the growing role of serverless, K8s for AI/ML, security, cost optimization, and more.
Download Paper
Webinar
Infrastructure Auditing Made Easy
This webinar is a deep dive into Teleport’s new Audit Log capability, dashboard, and refreshed unified resource UI.
Watch Webinar
Webinar
Securing RDS with Teleport
In this session, we will explore how Teleport can be used to achieve identity-based, time-bound access to private RDS endpoints, just-in-time elevated access, and full audit trail connecting identities to database queries.
Watch Webinar
Book
O'Reilly: Identity-Native Infrastructure Access
How can you secure access to diverse infrastructure components, from bare metal to ephemeral containers, consistently and simply? In this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces.
Download Book
Webinar
Protecting your Windows Fleet with Zero-Trust
Learn about evolving patterns and remote access practices and how to safeguard your Windows Servers optimally.
Watch Webinar
Webinar
Modern Strategies and Tools for Securing Internal Applications
This session will equip you with the knowledge to navigate the ever-evolving cybersecurity landscape and develop effective security strategies for your internal web applications.
Watch Webinar
Webinar
Unlocking AI Potential: Streamlining Database Access with Teleport
We’ll focus on Teleport’s Database Access component and how our Access Requests feature can be leveraged to achieve the principle of least privilege or just-in-time access.
Watch Webinar
Podcast
Access Control Podcast. Episode 19
Ben Arent interviews Nikhil Jha, site manager of the Berkeley Open Computing Facility (OCF).
Listen to Access Control Podcast
1
2
3
...
14