No More Backdoors: Know Who Has Access to What, Right Now
Jun 13
Virtual
Register Today
Teleport logoTry For Free
Background image

Teleport Teleport Webinars & Videos | Expert Technical Discussions on Secure Infrastructure Access

Webinar

No More Backdoors: Know Who Has Access to What, Right Now

No More Backdoors: Know Who Has Access to What, Right Now

With threat actors able to breach and pivot to sensitive resources in less than 62 minutes, the security of your infrastructure depends on the ability to quickly identify who has access to what. This webinar introduces infrastructure professionals to Teleport Policy, which provides a visually rich view of access relationships and the tools to quickly uncover and remediate long-standing privileges and shadow or risky access paths.

Watch Webinar

Webinar

Teleport Overview

Teleport Overview

This is a high level overview of the Teleport Access Platform delivers on-demand, least-privileged access to infrastructure on a foundation of cryptographic identity and zero trust, with built-in identity security and policy governance. The Teleport Access Platform improves productivity for engineers and operations teams, makes infrastructure resilient to bad actors or human error, and delivers fast, accurate reporting for compliance audits.

Watch Webinar

Webinar

Teleport Workload Identity with SPIFFE: Achieving Zero Trust in Modern Infrastructure

Teleport Workload Identity with SPIFFE: Achieving Zero Trust in Modern Infrastructure

Teleport Access Platform generates cryptographic identity for users, machines, devices, and resources, creating a single source of truth for what users and machines are accessing what in your modern infrastructure. Now, engineers will be able to generate identity specific to workloads and services, enabling your full modern infrastructure stack to operate with zero trust authentication.

Watch Webinar

Webinar

Scaling Privileged Access for Modern Infrastructure: Real-World Insights

Scaling Privileged Access for Modern Infrastructure: Real-World Insights

In this session, John Capps, Vice President of Infrastructure at VIDA, a leading digital identity company operating in Indonesia, shares his team's transformative journey in securing privileged access. John outlines the initial use cases that focused on fortifying and streamlining his engineering team's access, along with subsequent expansions to cater to broader business functions and customer requirements.

Watch Webinar

Webinar

Transforming Privileged Access: A Dialogue on Secretless, Zero Trust Architecture

Transforming Privileged Access: A Dialogue on Secretless, Zero Trust Architecture

Join us for an insightful webinar featuring IAM analyst Jack Poller and Teleport CEO Ev Kontsevoy as they delve into the nuances of privilege management and the paradigm shift towards a secretless, zero trust, least privileged architecture for engineers accessing cloud and on-premises compute infrastructure.

Watch Webinar

Webinar

Teleport 15 Unveiled: Elevating Access and Security Across Infrastructure

Teleport 15 Unveiled: Elevating Access and Security Across Infrastructure

Join us for an exclusive first look at Teleport 15, the latest version of the Teleport Platform. In this webinar, we’ll review the latest editions to Teleport and will cover tips for upgrading.

Watch Webinar

Webinar

Modernizing Access to Mitigate Security Risk and Speed Threat Response

Modernizing Access to Mitigate Security Risk and Speed Threat Response

Organizations face increasing risk of data breach, with threat actors taking aim at credentials and standing privileges. So, what can companies do to protect their infrastructure?

Watch Webinar

Webinar

Managing Multi-Account AWS Console and CLI Access with Teleport

Managing Multi-Account AWS Console and CLI Access with Teleport

Are you using multiple AWS accounts to separate your environments like many of the engineering teams we work with? If you are, you may be looking for a better way to access those accounts.

Watch Webinar

Hot Take

Hot Takes Episode 1

Hot Takes Episode 1

This Month's Hot Take: Five renowned experts from the Kubernetes community will be discussing how human-error is the most significant threat to the security of your infrastructure, NOT hackers and ransomware.

Watch Hot Take

  • 1

  • 2

  • 3

  • ...

  • 9