"Shadow IT" has always been a challenge. In the past, it were Excel sheets or databases that formed an IT structure that was difficult to control and unauthorised. Today, we see independent container deployments, unofficial container images, uncontrolled use of cloud services and unauthorised Kubernetes clusters.
In this live discussion with Holger Moenius, Domain Sales Specialist (DSS), Dieter Reuter, Domain Solution Architect (DSA)and Knut Trepte, Senior Produkt Manager Security von SUSE and Yiannis Englberger, Consultant Cloud and ...