Security-oriented OpenShift within regulated environments

As one of the biggest banks in Central Europe, BZ WBK uses hundreds of systems, many of which were developed years ago when virtualization wasn’t a commodity like it is today. In a quest for more flexibility and efficiency, BZ WBK explored various options to improve and modernize its delivery and deployment pipeline, finally choosing Red Hat OpenShift.

In this session, we'll share why we chose OpenShift, how it affects our applications and infrastructure, and how it meets high security expectations and compliance/regulatory standards. We'll present real, technical-level examples of how to build pipelines, release secure containers and isolate them accordingly, and other tools you may need to successfully deploy them in production—all based on our experience building a working solution.

  • Date:Wednesday, May 9
  • Time:4:30 PM - 5:15 PM
  • Room:2003
  • Location:Moscone West - 2003
  • Session Type:Breakout
  • Session Code:S1778
  • Session Includes:Red Hat customer implementation, Red Hat partner implementation
  • Topic(s):Application delivery, Containers, Security
  • Technical difficulty:Working knowledge required
  • Primary solution:None of the above
  • Best for people who:Design application/system architectures, Make final decisions about IT purchases/vendors
  • Industry:Financial services
  • Products and Services:Community project(s), Red Hat CloudForms, Red Hat OpenShift Container Platform
  • Time slot:Afternoon
  • Trail maps:Security, Financial services