Events
Scalable, Secure, and Synergetic: Aviatrix Kubernetes Firewall
Join us for an insightful session on addressing the most critical challenges in enterprise Kubernetes deployments: Dynamic security that persists outside the cluster, and IP address exhaustion.
Kubernetes adoption is surging by 68% year-over-year and now powers production workloads in over 96% of organizations running containerized applications. As enterprises accelerate their application modernization efforts, they face the hidden complexity of Kubernetes environments, struggling with implementing granular security that uses Kubernetes attributes for dynamic policy reconciliation.
In addition, Kubernetes deployments consume up to ten times more IP addresses than traditional VM-based architectures, which often manifests with overlapping or non-routable IP address schemas. These are hard to manage and harder to build a scalable, secure policy for enforcement.
In this webinar, Chris McHenry and Tim McConnaughy will bring the challenges of Kubernetes deployments to light, including:
- The IP Exhaustion Crisis: Why Kubernetes deployments rapidly exhaust available IP addresses and how overlapping CIDR blocks create security and connectivity risks
- Identity Beyond Active Directory: How identities take on new meaning when it comes to workloads, and what that means for enterprise operations
- Protecting AI & High-Value Workloads: Common snags when securing AI models and other critical applications running in Kubernetes environments
The speakers will also demonstrate the capabilities of Aviatrix Kubernetes Firewall in solving these challenges:
- Extending Beyond Clusters: Integrating with current Kubernetes-focused solutions such as CNI and service mesh, providing an approach that extends beyond the Kubernetes cluster
- Advanced NAT Capabilities: Eliminating IP dependencies while maintaining robust security posture across multi-cluster environments
- Identity-Based Security: How shifting from ephemeral IP-based to namespace/cluster-based security policies enables more granular control and consistent compliance
- Bridging Enterprise Environments: Implementing unified security across Kubernetes and traditional workloads with centralized policy management
Whether you’re a security professional, platform engineer, or DevOps practitioner, this session will provide actionable insights on protecting cloud-native applications without sacrificing agility or scale.
Learn how organizations are implementing zero trust principles across hybrid environments while addressing the unique security and networking challenges of Kubernetes – unlocking the full potential of their Kubernetes investments.

- There were no results found.
- There were no results found.
Virtual
- Events
- Venues
- Virtual