Security in Serverless Computing

Watch Full Webinar

Before filling out the registration form, please read the Privacy notice pursuant to Article 13 of EU Regulation 2016/679

Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input

Privacy


I declare that I have read and fully understood the Privacy Notice and I hereby express my consent to the processing of my personal data by Reply SpA for marketing purposes, in particular to receive promotional and commercial communications or information regarding company events or webinars, using automated contact means (e.g. SMS, MMS, fax, email and web applications) or traditional methods (e.g. phone calls and paper mail).

Webinar Overview

Serverless computing increases your company’s agility and innovation by allowing it to focus on delivering value to customers rather than infrastructure operations. With serverless computing the IT infrastructure, its maintenance and its scaling are shifted towards cloud providers. But what about security? Can this responsibility also be shifted and if so, how much of it?

In this webinar Spike Reply goes through a brief introduction to serverless computing, followed by a deep dive into its security. The experts analyze how security differs in serverless architectures compared to classical ones, and go over the top security risks and how to best protect against them. You get a better understanding of the security challenges in serverless computing and will understand how going serverless could lead to a positive effect on your company’s security posture.

Key Takeaways

As many organizations are taking their first steps into the serverless world, their security departments are facing new challenges.
IT Security representatives who find themselves in a similar situation are encouraged to attend this talk to gain insights on how to tackle them. Attendees benefit from examples and recommendations on how to approach security concepts in serverless computing.

  • strip-0

    SPIKE REPLY

    Spike Reply is the specialist for IT security within the Reply Group. Spike Reply secures the values and privacy of people, companies and processes to support the growth of a global sustainable digital world through innovation. The offering includes Proof of Concept (PoC), partial or complete solution implementations for network, cloud, endpoint or data protection systems and a complete Managed Security Service (5x8 or 24x7). Together with security partners, Spike Reply accompanies enterprises on the way to a company-wide, security-driven data culture.