Hi [[ session.user.profile.firstName ]]

F5 Security

  • Date
  • Rating
  • Views
  • How to Gain Visibility into Encrypted Threats
    How to Gain Visibility into Encrypted Threats
    Jay Kelley, Principal Product Marketing Manager - F5 Networks Peter Silva, Security Solutions Marketing Manager - F5 Networks Recorded: Dec 26 2018 40 mins
    Driven by built-in web browser warnings, the EU GDPR, and general security and privacy awareness, encrypting data-in-transit with SSL/TLS is now a standard practice among many organizations. This is a great win for security overall to help prevent data breaches, however cyber criminals are using these encrypted channels to propagate malware and exfiltrate data knowing they can bypass traditional security inspection solutions that don’t decrypt traffic.

    Join this webinar to learn more about:

    - Challenges with encrypted traffic and risks to your business
    - How to efficiently decrypt and orchestrate traffic to reduce latency
    - How to intelligently manage decryption and re-encryption across all of your security inspection solutions (IDS/IPS, NGFW, Malware Sandbox, etc.)
  • Defense Intense - Portable Multi-Cloud Security for the Agile Era
    Defense Intense - Portable Multi-Cloud Security for the Agile Era
    Nathan Mckay- Solutions Marketing Manager, F5 Networks Robert Haynes- Cloud Technical Marketing, F5 Networks Recorded: Dec 26 2018 57 mins
    Defending apps in the cloud can be difficult – especially if you are pursuing a multi-cloud strategy. No matter where you deploy, your apps need resilience, which means robust defenses to ensure their continued availability. Ensure your customers (and their data) get the protection they need in the face of current and emergent threats. Not all risks are related to software vulnerabilities - some, such as “credential stuffing”, are inherited from breaches that have occurred elsewhere.

    Portable, proactive security is possible. Make sure your development teams have access to the tools they need to enable them to move fast while still delivering the confidentiality, integrity, and availability your customers expect and deserve. There are lots of options; be sure to leverage the ones best suited to protect your technology platforms and business priorities.

    In this webinar you will learn:

    - How to build an application protection strategy that will proactively protect your assets across clouds
    - How you can go beyond vulnerability management and address real business risks, such as denial of service, fraud, and intellectual property theft
    - How multi-cloud can help you stay ahead of your competitors and reap the rewards of economy scale and pricing
    - How F5 can help your organization identify and solve problems that are impacting your bottom line
  • How to Build a Comprehensive Defense Against DDoS Attacks
    How to Build a Comprehensive Defense Against DDoS Attacks
    Nathan Mckay- Solutions Marketing Manager, F5 Networks David Remington- Security Solutions Architect, F5 Networks Recorded: Sep 10 2018 51 mins
    DDoS attacks continue to increase in frequency – and complexity. Your network, apps, and other supporting infrastructure make for a large DDoS attack surface, meaning defense must be comprehensive. A DDoS solution should address all types of attacks whether a volumetric attack aimed at your network bandwidth or a low-and-slow attack aimed at your app or infrastructure.

    F5 DDoS Hybrid Defender (DHD) is a unique solution that offers comprehensive DDoS protection against all attack types, turning a potential catastrophe into a minor annoyance.

    Join us for this webinar to learn about:
    •Ensure accurate DDoS attack detection utilizing attack signatures, behavioral analytics to identify deviations from normal traffic, and detection of server stress
    •Leverage real-time traffic decryption to protect your applications as well as your network and intelligently block the bad traffic without impacting the good traffic
    •Automatically signal to F5’s cloud-based scrubbing service, and seamlessly re-direct attack traffic to prevent even the largest volumetric attacks from saturating your bandwidth
  • Thingbot Apocalypse - How to prepare for IoT device attacks
    Thingbot Apocalypse - How to prepare for IoT device attacks
    Sara Boddy- Director, F5 Labs Recorded: Jul 27 2018 48 mins
    Our modern world depends on healthy, functioning, IoT devices; however, many of them are unsecure. Cyber attackers have compromised IoT devices for over a decade, turning them into Thingbots―botnets made from IoT devices.

    The hunt for IoT attacks has made a pivotal turn in the last two and a half years. F5 Labs has been tracking these attacks and the subsequent building of Thingbots from boutique attacks, into more sophisticated and powerful cyber weapons. Thingbots are now being sold as multi-vector bots-for-hire that allow cyber attackers to launch any attack of their choice―often used for automated web application attacks and credential stuffing.

    With the threat of IoT attacks increasing, as billions of new devices are deployed each year, the ability to detect threats, and clean and upgrade infected systems is still not a part of most IoT development processes.

    In this webinar we’ll explore:

    - How attacks have evolved from the methods they use to the attacks they launch from the resulting Thingbots
    - The threat actor networks and IPs behind these attacks, their geographical targets, and how that has changed over time
    - What you should do to protect your company
  • The Internet of "Very Bad" Things
    The Internet of "Very Bad" Things
    Sara Boddy- Director, F5 Labs and Thomas Norman- CPP/PSP, Ingram Recorded: Jun 8 2018 53 mins
    While attackers have been exploiting IoT devices in the consumer market for a while, they’re now increasingly targeting higher value business targets. IoT devices are typically not secure and they can be used to gain entry into your network where a devastating attack can then be carried out.

    Join top security researchers Thomas Norman, Ingram Micro, Sara Boddy and Justin Shattuck from F5 Labs, and Moderator Gregg Linde as they discuss the realities of IoT security and find out:

    • What IoT means to consumers and enterprises
    • How attackers use IoT to carry out attacks
    • Why current IoT Security approaches are making the problem worse
    • How you can protect your data and organization from IoT attacks
  • Leveraging innovative security and app delivery solutions from the F5-Microsoft
    Leveraging innovative security and app delivery solutions from the F5-Microsoft
    Jeff Stathatos- Cloud Solutions Architect, F5 Networks, Claus Wieser- Senior Partner Development Manager, Microsoft Recorded: Jun 6 2018 38 mins
    Hear experts from F5 and Microsoft talk about joint offerings that provide more secure application delivery, upgrade federated identity security, and maximize app security in the cloud.

    Join us to learn more about:

    • How you can fortify your identity security and improve the UX for Microsoft Active Directory and Office 365
    • How to enable faster, smarter, and safer app deployment by inserting a CI/CD toolchain into your application infrastructure
    • How to mitigate vulnerabilities and stop application threats throughout your journey to Azure using the F5 WAF for Azure
  • Why Advanced Threats Require Advanced Application Defense
    Why Advanced Threats Require Advanced Application Defense
    Brian McHenry- Senior Manager, Global Customer Solutions Engineering Byron McNaught- Product Marketing Manager Recorded: May 17 2018 46 mins
    Web application attacks are the #1 source of data breaches. A Web Application Firewall (WAF) provides critical security controls to protect web apps. However, not all WAF solutions are the same. While many can help an organization protect their apps from common and known threats, most are inadequate against the myriad of attacks across the evolving risk landscape.

    F5 announced Advanced WAF, a new category of app protection that introduces unique capabilities to the WAF market. Watch this webinar to learn how F5’s Advanced WAF can:

    • Provide strong, adaptable security for every app, whether on-premises or in the cloud
    • Defend web and mobile apps against malicious bots and exploits
    • Prevent account takeover and stop large scale credential theft and abuse
    • Protect apps from layer 7 denial of service attacks
  • Making Security Cloud-Friendly
    Making Security Cloud-Friendly
    Nathan McKay and Robert Haynes Recorded: Apr 19 2018 61 mins
    Security in the cloud vs. cloud security – whose job is it anyway? According to F5 Labs researchers, 86% of successful data breaches begin with compromises of the application layer services or user identities – placing responsibility for app security squarely in the hands of the app owners, developers, and enterprises deploying them. Application security can be difficult and daunting, but it doesn’t have to be.

    The cloud paradigm has made infrastructure easy for lots of us, and application security is poised to follow suit with advanced security tools now more affordable and accessible than ever via your favorite cloud du jour. We’ve reached a new inflection point where security tools once seen as costly and burdensome can now be seen as business enablers.
  • Imperva Part 3: The Rise of Bots: Top 5 Bot Driven Threats & How to Stop Them
    Imperva Part 3: The Rise of Bots: Top 5 Bot Driven Threats & How to Stop Them
    Brian McHenry, Senior Manager, Systems Engineering, F5; Brandon Dunlap, Moderator Recorded: Mar 29 2018 59 mins
    Bots are now teetering on the edge of being the majority of traffic on the internet. It’s not all bad news, as there are plenty of useful bots that make both our work and personal lives more productive. However, malicious bot and botnet creators have introduced more sophistication into their bots, making them harder to detect, and the resulting threats are becoming more common place. Join F5 and (ISC)2 on March 29, 2018 at 1:00PM Eastern as data gathered from internal threat research teams is presented that explains how bots are being created, the top application threats driven by bots, and how to detect and better protect to your business.
  • How to Combat the 7 Common Emergent Threats
    How to Combat the 7 Common Emergent Threats
    Keiron Shepherd, Senior Systems Engineer - Security, F5 Networks Recorded: Mar 21 2018 64 mins
    In today’s digital marketplace, your applications are the backbone of your business. However, cloud-based apps create a host of complex challenges and new risks. With automated tools and hackers for hire, threats are increasing and cybercrime has turned into a game for profit. The digital world has opened the door to unprecedented threats, putting your corporate data and reputation at risk.

    Join us for this webinar to learn about:
    • The 7 most common threats to your apps and data: Malicious bots, Credential stuffing, DDoS, Ransomware, Web fraud, Phishing, and Malware
    • How you can leverage threat intelligence to secure your apps and data
    • Where to spend your security budget to provide the strongest level of protection

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.

Embed in website or blog