{"id":6122,"date":"2022-03-27T08:03:34","date_gmt":"2022-03-27T06:03:34","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog\/?p=6122"},"modified":"2022-04-19T10:56:49","modified_gmt":"2022-04-19T08:56:49","slug":"secrets-management-webinar-akeyless-vault","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/","title":{"rendered":"New Recording: Secrets Management Workshop Using Akeyless Vault"},"content":{"rendered":"<p>Recently we hosted a live webinar + workshop about <strong>Secrets Management<\/strong>,<br \/>\nand the recording is ready!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6166 size-full\" src=\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2022\/03\/akeyless-linkedin.png\" alt=\"secrets management akeyless live webinar\" width=\"698\" height=\"400\" srcset=\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/2022\/03\/akeyless-linkedin.png 698w, https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/2022\/03\/akeyless-linkedin-300x172.png 300w, https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/2022\/03\/akeyless-linkedin-150x86.png 150w\" sizes=\"auto, (max-width: 698px) 100vw, 698px\" \/><\/p>\n<p>One of the well-known challenges in recent years are the <em>secrets sprawl<\/em> and <em>how to protect secrets<\/em>.<br \/>\nAs more companies move to cloud, use Kubernetes or microservices &#8211; they understand those challenges are more critical.<br \/>\nRecently we have started to represent the Akeyless company and help shops apply its solutions<br \/>\n(after we tried it ourselves and realized it&#8217;s really good).<\/p>\n<p>Now we&#8217;re happy to organize a unique webinar that also offers <strong>hands-on practice<\/strong> and even gives you a free SaaS account you can use after the webinar!<\/p>\n<h3>When?<\/h3>\n<p><del>Tuesday, April 5th at 5PM CET \/ 11AM ET \/ 8AM PST .\u00a0<\/del><br \/>\n<del>Registration is free but space is limited.<\/del><\/p>\n<p><del>We plan to record the webinar!<\/del><\/p>\n<p>We\u2019ll share the recordings with all those who are registered.<\/p>\n<p><strong>The webinar was recorded and we&#8217;ll share the recording soon<\/strong><\/p>\n<p><strong>BONUS<\/strong>: we&#8217;ll share our new white paper about &#8220;10 Tips on How to Choose the Optimal Secrets Management Solution&#8221; with all registrants.<\/p>\n<h3>Register here to get the content to your email:<\/h3>\n<div class=\"alm-box\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f6130-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"6130\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/blog\/wp-json\/wp\/v2\/posts\/6122#wpcf7-f6130-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"6130\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f6130-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"gitlab-form bg-form m-width-100\" style=\"max-width:50%;\">\n\t<p>* Full Name<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t<\/p>\n\t<p>* Work Email<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Work Email only\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n\t<\/p>\n\t<p>* Are you currently using any secrets management solution? If so, which one?<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"text-388\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"text-388\" \/><\/span>\n\t<\/p>\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"referer-page\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text referer-page\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"referer-page\" \/><\/span>\n\t<\/p>\n\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner button button-large\" type=\"submit\" value=\"Send\" \/>\n\t<\/p>\n<\/div><div class=\"wpcf7-form-control-wrap maspik-field\">\n                <label for=\"full-name-maspik-hp\" class=\"wpcf7-form-control-label\">Leave this field empty<\/label>\n                <input size=\"1\" type=\"text\" autocomplete=\"off\" aria-hidden=\"true\" tabindex=\"-1\" name=\"full-name-maspik-hp\" id=\"full-name-maspik-hp\" class=\"wpcf7-form-control wpcf7-text\" placeholder=\"Leave this field empty\">\n            <\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h3>What you will gain by the end of the webinar:<\/h3>\n<ol>\n<li>More knowledge: what <em>secrets<\/em> are and how to protect them<\/li>\n<li>Best practices of <em>Secrets management<\/em><\/li>\n<li>Your own private and free account you can use to protect your secrets (at any time)<\/li>\n<\/ol>\n<h3><span style=\"font-weight: 400;\">Agenda:<\/span><\/h3>\n<ul>\n<li>Intro: What are secrets and the challenges of protecting them (10 min.)<\/li>\n<li>Demo: How Akeyless Vault resolves those challenges (10 min.)<\/li>\n<li>Demo: Secure Remote Access (5 min.)<\/li>\n<li>Q &amp; A<\/li>\n<li>Hands-on Workshop (20 min.): Open your account and practice two use cases:\n<ul>\n<li>Protecting static secrets in a source code (Python)<\/li>\n<li>Protecting secrets embedded in CI (Continuous Integration) system<br \/>\n(and reading secrets while running a CI\/CD pipeline)<\/li>\n<li>Protecting a database credentials (Postgres) using dynamic secrets<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div><\/div>\n<h3>Who should join?<\/h3>\n<p>DevOps experts, Security experts, CISOs, Architects, Developers and R&amp;D managers<\/p>\n<h3>What&#8217;s needed for the workshop part?<\/h3>\n<ul>\n<li>Internet connection<\/li>\n<li>A basic understanding of containers and using CLI<\/li>\n<\/ul>\n<p>We&#8217;ll provide all instructions by email for all registrants.<\/p>\n<h3>Who will be delivering the webinar?<\/h3>\n<ol>\n<li><span style=\"font-weight: 400;\">Amnon Nessim: Amnon has vast experience in Secrets management, security, DevSecOps and 20+ years experience in Linux administration.<\/span><\/li>\n<li>Oded Hareven, Akeyless CEO: Oded specializes in Identity and Access Management technologies and held various senior product and project management positions before establishing Akeyless.<\/li>\n<li><span style=\"font-weight: 400;\">Tamir Gefen, ALM-Toolbox CEO: Tamir has vast experience in business challenges and workflows around DevSecOps.<\/span><\/li>\n<\/ol>\n<h3>Frequently Asked Questions (FAQ):<\/h3>\n<ul>\n<li><strong>Q: In which language the webinar will be delivered?<\/strong><br \/>\nA: English<\/li>\n<li><strong>Q: Would it be possible to use your hands-on workshop after the live webinar?<\/strong><br \/>\nA: Yes we will provide instructions for those who are registered. Yet we recommend joining the live session so you can ask questions and get answers immediately.<\/li>\n<li><strong>Q: What is Akeyless?<\/strong><br \/>\nA: Akeyless provides unique solutions of secrets management, secure remote access, data protection and &#8220;Zero Trust&#8221;.<br \/>\nIf you&#8217;d like to learn more about the solutions you can visit our website or contact us: <a href=\"mailto:akeyless@almtoolbox.com\" target=\"_blank\" rel=\"noopener\">akeyless@almtoolbox.com<\/a><\/li>\n<li><strong>Q: Will you demonstrate a use case with Kubernetes?<\/strong><br \/>\nA: We may organize this in a future workshop. We can provide instructions and help you implement it &#8211; contact us by email.<\/li>\n<\/ul>\n<div class=\"\" style=\"border: 1px solid #eacd85; background: #ffeec5; padding: 1.1em 1.2em; border-radius: 4px;\">\n<p><em><strong> ALM-Toolbox company is a partner of Akeyless and GitLab.<\/strong><\/em><\/p>\n<p><i>ALM-Toolbox provides ALM and DevSecOps professional services, support, private \/public cloud hosting, training and licenses for many DevOps \/ ALM toolset including git, GitLab, Kubernetes, Docker, SonarQube, Jenkins, Jira, Terraform, Akeyless, HashiCorp Vault, Mattermost, Bitbucket, Sysdig, Fossa, ClearCase, ClearQuest and more.<\/i><\/p>\n<p><em>Contact us: <a href=\"mailto:akeyless@almtoolbox.com\" target=\"_blank\" rel=\"noopener\">akeyless@almtoolbox.com<\/a> or +31 85 064 4633 (international) or 866-503-1471 (USA\/Canada)<\/em><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<h3>Related Links:<\/h3>\n<ul>\n<li>Our <a href=\"https:\/\/www.almtoolbox.com\/akeyless-vault\" target=\"_blank\" rel=\"noopener\">Akeyless Vault webpage<\/a><\/li>\n<li>Our <a href=\"https:\/\/www.almtoolbox.com\/akeyless-remote-access\" target=\"_blank\" rel=\"noopener\">Akeyless Secure Remote Access webpage<\/a><\/li>\n<li><a href=\"https:\/\/www.almtoolbox.com\/gitlab\" target=\"_blank\" rel=\"noopener\">GitLab webpage<\/a><\/li>\n<li>Our <a href=\"https:\/\/www.almtoolbox.com\/blog\/devops-webinars-vod-library\/\" target=\"_blank\" rel=\"noopener\">Recorded DevOps Webinars<\/a> (watch on demand)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Recently we hosted a live webinar + workshop about Secrets Management, and the recording is ready! One of the well-known challenges in recent years are the secrets sprawl and how to protect secrets. As more companies move to cloud, use Kubernetes or microservices &#8211; they understand those challenges are more critical. Recently we have started [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":6166,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[345,166,351,47,54],"tags":[],"class_list":["post-6122","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-akeyless","category-gitlab","category-secrets-management","category-training","category-webinars"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Recording: Secrets Management Workshop Using Akeyless Vault - ALMtoolbox News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Recording: Secrets Management Workshop Using Akeyless Vault - ALMtoolbox News\" \/>\n<meta property=\"og:description\" content=\"Recently we hosted a live webinar + workshop about Secrets Management, and the recording is ready! One of the well-known challenges in recent years are the secrets sprawl and how to protect secrets. As more companies move to cloud, use Kubernetes or microservices &#8211; they understand those challenges are more critical. Recently we have started [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/\" \/>\n<meta property=\"og:site_name\" content=\"ALMtoolbox News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/almtoolbox.israel\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-27T06:03:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-19T08:56:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2022\/03\/akeyless-linkedin.png\" \/>\n\t<meta property=\"og:image:width\" content=\"698\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Noa Harel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Noa Harel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/\"},\"author\":{\"name\":\"Noa Harel\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/person\/a7d03132957d034fc2fc5454501a204a\"},\"headline\":\"New Recording: Secrets Management Workshop Using Akeyless Vault\",\"datePublished\":\"2022-03-27T06:03:34+00:00\",\"dateModified\":\"2022-04-19T08:56:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/\"},\"wordCount\":627,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2022\/03\/akeyless-linkedin.png\",\"articleSection\":[\"Akeyless\",\"GitLab\",\"Secrets Management\",\"Training\",\"Webinars\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/\",\"url\":\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/\",\"name\":\"New Recording: Secrets Management Workshop Using Akeyless Vault - ALMtoolbox News\",\"isPartOf\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2022\/03\/akeyless-linkedin.png\",\"datePublished\":\"2022-03-27T06:03:34+00:00\",\"dateModified\":\"2022-04-19T08:56:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#primaryimage\",\"url\":\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2022\/03\/akeyless-linkedin.png\",\"contentUrl\":\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2022\/03\/akeyless-linkedin.png\",\"width\":698,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.almtoolbox.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Recording: Secrets Management Workshop Using Akeyless Vault\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#website\",\"url\":\"https:\/\/www.almtoolbox.com\/blog\/\",\"name\":\"ALMtoolbox News\",\"description\":\"All the news of ALMtoolbox\",\"publisher\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.almtoolbox.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#organization\",\"name\":\"ALMtoolbox\",\"url\":\"https:\/\/www.almtoolbox.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2015\/10\/logo.png\",\"contentUrl\":\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2015\/10\/logo.png\",\"width\":410,\"height\":190,\"caption\":\"ALMtoolbox\"},\"image\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/almtoolbox.israel\/\",\"https:\/\/www.linkedin.com\/company\/almtoolbox\/\",\"https:\/\/www.youtube.com\/user\/GoMidjets\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/person\/a7d03132957d034fc2fc5454501a204a\",\"name\":\"Noa Harel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3ac19cddc8dc6e7e817cf650b22399303e8b6dd585bc90e4606b28ec87ef1943?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3ac19cddc8dc6e7e817cf650b22399303e8b6dd585bc90e4606b28ec87ef1943?s=96&d=mm&r=g\",\"caption\":\"Noa Harel\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Recording: Secrets Management Workshop Using Akeyless Vault - ALMtoolbox News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/","og_locale":"en_US","og_type":"article","og_title":"New Recording: Secrets Management Workshop Using Akeyless Vault - ALMtoolbox News","og_description":"Recently we hosted a live webinar + workshop about Secrets Management, and the recording is ready! One of the well-known challenges in recent years are the secrets sprawl and how to protect secrets. As more companies move to cloud, use Kubernetes or microservices &#8211; they understand those challenges are more critical. Recently we have started [&hellip;]","og_url":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/","og_site_name":"ALMtoolbox News","article_publisher":"https:\/\/www.facebook.com\/almtoolbox.israel\/","article_published_time":"2022-03-27T06:03:34+00:00","article_modified_time":"2022-04-19T08:56:49+00:00","og_image":[{"width":698,"height":400,"url":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2022\/03\/akeyless-linkedin.png","type":"image\/png"}],"author":"Noa Harel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Noa Harel","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#article","isPartOf":{"@id":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/"},"author":{"name":"Noa Harel","@id":"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/person\/a7d03132957d034fc2fc5454501a204a"},"headline":"New Recording: Secrets Management Workshop Using Akeyless Vault","datePublished":"2022-03-27T06:03:34+00:00","dateModified":"2022-04-19T08:56:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/"},"wordCount":627,"commentCount":0,"publisher":{"@id":"https:\/\/www.almtoolbox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#primaryimage"},"thumbnailUrl":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2022\/03\/akeyless-linkedin.png","articleSection":["Akeyless","GitLab","Secrets Management","Training","Webinars"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/","url":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/","name":"New Recording: Secrets Management Workshop Using Akeyless Vault - ALMtoolbox News","isPartOf":{"@id":"https:\/\/www.almtoolbox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#primaryimage"},"image":{"@id":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#primaryimage"},"thumbnailUrl":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2022\/03\/akeyless-linkedin.png","datePublished":"2022-03-27T06:03:34+00:00","dateModified":"2022-04-19T08:56:49+00:00","breadcrumb":{"@id":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#primaryimage","url":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2022\/03\/akeyless-linkedin.png","contentUrl":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2022\/03\/akeyless-linkedin.png","width":698,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.almtoolbox.com\/blog\/secrets-management-webinar-akeyless-vault\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.almtoolbox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"New Recording: Secrets Management Workshop Using Akeyless Vault"}]},{"@type":"WebSite","@id":"https:\/\/www.almtoolbox.com\/blog\/#website","url":"https:\/\/www.almtoolbox.com\/blog\/","name":"ALMtoolbox News","description":"All the news of ALMtoolbox","publisher":{"@id":"https:\/\/www.almtoolbox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.almtoolbox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.almtoolbox.com\/blog\/#organization","name":"ALMtoolbox","url":"https:\/\/www.almtoolbox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2015\/10\/logo.png","contentUrl":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2015\/10\/logo.png","width":410,"height":190,"caption":"ALMtoolbox"},"image":{"@id":"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/almtoolbox.israel\/","https:\/\/www.linkedin.com\/company\/almtoolbox\/","https:\/\/www.youtube.com\/user\/GoMidjets"]},{"@type":"Person","@id":"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/person\/a7d03132957d034fc2fc5454501a204a","name":"Noa Harel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3ac19cddc8dc6e7e817cf650b22399303e8b6dd585bc90e4606b28ec87ef1943?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3ac19cddc8dc6e7e817cf650b22399303e8b6dd585bc90e4606b28ec87ef1943?s=96&d=mm&r=g","caption":"Noa Harel"}}]}},"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/posts\/6122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/comments?post=6122"}],"version-history":[{"count":33,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/posts\/6122\/revisions"}],"predecessor-version":[{"id":6231,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/posts\/6122\/revisions\/6231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/media\/6166"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/media?parent=6122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/categories?post=6122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/tags?post=6122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}