Indonesia Event
Date & Time :
28 July 2022, 4pm WIB
Venue :
Hotel Mulia/Gerbera Room (Mezzanine Floor)
Jalan Asia Afrika Senayan, RT.1/RW.3, Gelora,
Kecamatan Tanah Abang, Kota Jakarta Pusat,
Daerah Khusus Ibukota Jakarta 10270
The adoption of cloud means teams and organizations are rethinking how to secure their applications and infrastructure. Security in the cloud is being recast from static and IP-based – defined by a perimeter – to dynamic and identity-based – with no clear perimeter. This idea is known as zero trust security.
Zero trust security is predicated on securing everything based on trusted identities. With HashiCorp’s model around zero trust security, organizations can manage their transition to the cloud while maintaining the level of security they need, one that trusts nothing and authenticates and authorizes everything.
You are invited to Join us- HashiCorp and Cloud Kinetics on 28th July 2022 , @Hotel Mulia as we discuss how this makes it easier for customers to adopt Zero Trust Security across clouds.
Speaker:

CRO- Cloud Kinetics

Director Indonesia – Cloud Kinetics

CTO Indonesia – Cloud Kinetics

Regional Manager, Solutions Engineering,
Asia – HashiCorp

Senior Solutions Engineer,
Asia – HashiCorp
Agenda:
- The Pillars of Zero Trust Security
- Zero Trust in Action with Cloud Kinetics
- Managing Secrets Securely
- Zero Trust from an Infrastructure Provisioning Standpoint
- Q&A Session
Look forward to see you in person !
Enable scalable, dynamic security across clouds:
HashiCorp’s approach to identity-based security and access provides a solid foundation for companies to safely migrate and secure their infrastructure, applications, and data as they move to a multi-cloud world.
1 Improve enterprise security posture
Leverage identity-based authorization and access controls at all levels of networking and infrastructure along with fully integrated data encryption services.
2 Reduce the likelihood of a breach
Eliminate damage from secrets sprawl by authenticating and authorizing everything for machine and human-to-machine authentication, authorization, and access.
3 Accelerate secure multi-cloud adoption
Secure all your clouds with centralized secrets management that spans multiple cloud and on-prem environments, with dynamic service discovery for machine access.
Adopt Zero Trust Security across clouds with these four pillars
Machine authentication & authorization:
HashiCorp Vault enables enterprises to centrally store, access, and distribute dynamic secrets like tokens, passwords, certificates, and encryption keys across any public or private cloud environment. Unlike burdensome ITIL-based systems, HashiCorp solutions issue credentials to both people and machines in a dynamic fashion, creating a secure, efficient, and truly multi-cloud solution suited to today’s increasingly insecure world.
Machine-to-machine access:
HashiCorp Consul enables machine-to-machine access by enforcing authentication between applications and ensuring only the right machines are talking to each other. Consul codifies authorization and traffic rules with encrypted traffic while automating identity-based access for maximum scale, efficiency, and security. With Consul, organizations can discover services, automate network configurations, and enable secure connectivity across any cloud or runtime using service mesh.
Human access and authorization:
Companies use different identity platforms for federated systems of record. Leveraging these trusted identity providers is the principle of identity-based access and security. HashiCorp products have deep integration with the leading identity providers.
Human-to-machine access:
Traditional solutions for safeguarding user access used to require you to distribute and manage SSH keys, VPN credentials, and bastion hosts, which creates risks of credential sprawl and users gaining access to entire networks and systems. HashiCorp Boundary secures access to applications and critical systems with fine-grained authorizations that don’t require managing credentials or exposing your entire network.