Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Session 2: Protect Your Apps and APIs across a Distributed Cloud Richard Bible, F5 Senior Solutions Engineer With cloud architectures, protecting both the application business logic and the underlying infrastructure is paramount. With the F5 Distributed Cloud... 3 days ago | 32 mins Protect Your Apps and APIs to Thrive in a Multi-Cloud World Keiron Shepherd, Senior Solutions Architect - F5 With cloud architectures, protecting both the application business logic and the underlying application infrastructure is paramount. However, as appli... June 8, 2023 9:00am Session 1: Protect Your Apps and APIs across a Distributed Cloud Matthieu Dierick, F5 Senior Solutions Architect With cloud architectures, protecting both the application business logic and the underlying application infrastructure is paramount. With the F5 Distr... 1 week ago | 52 mins What is a WAAP? Brightboard Lesson Buu Lam, Sr. Solutions Architect, DevCentral, F5 So, what is WAAP? It is an evolution of the WAF, conceptually and it stands for Web Application & API Protection (WAAP). It is similar to WAF in that ... 8 hours ago | 7 mins Principles to Improve Network Traffic Assessment & Reduce Costs Darshan Shaw, Director Product Marketing - Gigamon + Naveen Bodla, Principal Solutions Architect - Gigamon Whether you need to optimize the efficiency of your existing tools or reduce future tool spending, Gigamon can show you how. Our traffic assessment to... 9 hours ago | 42 mins 5G, From Connectivity Pipe To Network As A Platform Ruth Brown, Principal Analyst – Mobile Networks & 5G, Heavy Reading (sponsored by Red Hat, originally broadcast by Light Reading on April 11, 2023) Overview: sponsored by Communication service providers (CSPs) are c... 5 hours ago | 61 mins Cloud Security in 2023: Staying Ahead in an Evolving Landscape Jo Peterson, Clarify360 An increased public cloud footprints equals an increase in operational complexity. With more access points and integrations to protect, many organizat... 1 day ago | 58 mins Code to Cloud Sec. Hour Series: Detecting & Preventing Supply Chain Attacks Sai Krishna Kumar Vootukuru, Senior Cloud Security Architect, Palo Alto Networks All software supply chain attacks share a core trait in common: they allow threat actors to break into organizations’ IT estate by exploiting vulnerab... 3 days ago | 23 mins Overcoming Complexities in Hybrid Cloud and Security with F5 and IBM Foo-Bang Chan, Senior Solutions Architect, F5 and Kian Sin Teo, Partner Technical Specialist – Cloud & Cognitive, IBM According to F5 State of Application Strategy 2023, 85% of organizations will use hybrid architecture for the foreseeable future. This implies that th... 2 days ago | 62 mins The Invisible Transformation: Retire Legacy LDAP Directories Without Disruption Doug Simmons, Principal Consulting Analyst for TechVision Research; Wade Ellery, Field CTO at Radiant Logic The legacy LDAP directory infrastructure is a major pain point today for organizations looking to cut costs, boost agility, and secure their environme... 1 day ago | 53 mins Load more