Markku Rossi - Credentialess Cloud Access
Some of the most common causes of cloud security breaches include system misconfiguration, dynamic system updating and patching, unmanaged and leaked access credentials. The industry is applying different methods to overcome these challenges. These methods include dynamic system monitoring and alerting, automated deployment pipelines, and access management including credential and key management and rotation. But what if we could overcome all of these challenges with an immutable cloud infrastructure that could be accessed without any credentials which could be leaked or compromised?
Language: English • Duration: 17:58 • Resolution: 1280x720
Watch on YouTube Learn more about this congressVideo Links
KuppingerCole PLUS
Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Stay Connected
How can we help you