Hi [[ session.user.profile.firstName ]]

Leveraging the Power of Threat Intelligence

It's becoming impossible for cyber security to keep up with paradigm-changing technological advancements which provide fertile new hunting ground for the more sophisticated cyber-criminals. You can't enumerate all possible attacks while calculating probabilities and impacts for each. We need to narrow things down. But when we reach for data, we drown in reports, dashboards, and alerts. We don't need more undigested data. We need answers. Enter threat intelligence. Useful threat intelligence is not data feeds of indicators without context, but interpretation that boils things down to provide recommendations so you can operate safely in the new Internet age. Threat intelligence demystifies the swarm of noise and connects the dots into threads that demystify what is really going on. We'll look at what good, actionable threat intelligence looks like and how you can use it to neutralize potential attacks before they strike. We'll look deeper at the threats against and originating from cloud platforms.
Recorded Mar 15 2017 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ray Pompon and Sara Boddy of F5
Presentation preview: Leveraging the Power of Threat Intelligence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Principles for Deploying a Secure Cloud Architecture Apr 15 2020 6:00 pm UTC 43 mins
    Tim Wagner, Principal Cloud Evangelist, F5 Networks
    In the shift to the cloud, enterprises are struggling to balance rapid business innovation with the integration of legacy systems into new cloud-based applications. Complicating matters further, you've got regulatory compliance constraints, escalating performance expectations from customers, and ever-evolving security risks.

    The good news is that successful enterprise cloud adoption models do exist, that make it possible for teams to work together in a multi-cloud world to deliver apps quickly and securely. We call this Secure Cloud Architecture.

    In this webinar, you’ll learn about:

    - Architecture design principles that support business outcomes at scale

    - How development and IT roles need to evolve to support the business

    - The importance of reusable infrastructure and security services

    Register Now
  • How to Uncover Threats Hiding in Encryption Apr 14 2020 6:00 pm UTC 50 mins
    Peter Silva, Sr. Solutions Marketing Manager, F5 Networks | Kevin Stewart, Security Solutions Architect, F5 Networks
    With close to 90% of the Internet encrypted and 68% of malware hiding in SSL/TLS web traffic, you may never see the threats lurking in your network. Many of the security inspection tools available today either fail to decrypt that traffic or they introduce latency and complexity, reducing security and scalability.

    Any serious malware threat will try to disguise itself as legitimate SSL/TLS traffic. So how can you see what you’re missing?

    Join this webinar and discover how to:

    • Intelligently decrypt SSL/TLS traffic and orchestrate your security inspection tools.

    • Protect SaaS applications, like Office 365, from malware and other threats.

    • Centralize decryption and re-encryption to increase the lifespan of your existing security devices.
  • 5G: An Opportunity to Get Security Right Apr 8 2020 6:00 pm UTC 50 mins
    Mark Campbell, Product Marketing, F5 Networks | Geoff Petersen, Product Management,F5 Networks
    What do endpoint validation, slicing, and automation have in common? All are essential components of a 5G security strategy. As preparation is underway for 5G services, providers are working to address a new set of security requirements.

    Leading providers are focused on implementing natively-designed security capabilities to cost-efficiently protect their infrastructures and subscribers.

    Join this webinar to gain F5 Networks insights on the market’s 5G security investment priorities and architecture preferences.

    We’ll review key findings from the F5 sponsored Heavy Reading 2019 5G Security Market Leadership study which details where leading providers are focusing their 5G security planning efforts.

    Join us for this webinar to learn about:

    - 5G security architecture preferences

    - Implementing security automation

    - Evolving network defenses to 5G
  • Principles for Deploying a Secure Cloud Architecture Apr 7 2020 6:00 pm UTC 43 mins
    Tim Wagner, Principal Cloud Evangelist, F5 Networks
    In the shift to the cloud, enterprises are struggling to balance rapid business innovation with the integration of legacy systems into new cloud-based applications. Complicating matters further, you've got regulatory compliance constraints, escalating performance expectations from customers, and ever-evolving security risks.

    The good news is that successful enterprise cloud adoption models do exist, that make it possible for teams to work together in a multi-cloud world to deliver apps quickly and securely. We call this Secure Cloud Architecture.

    In this webinar, you’ll learn about:

    - Architecture design principles that support business outcomes at scale

    - How development and IT roles need to evolve to support the business

    - The importance of reusable infrastructure and security services

    Register Now
  • Secure Web Apps Without Complexity, F5 Silverline WAF Recorded: Mar 31 2020 60 mins
    Tim Wagner, Sales Manager Security
    The growth of cloud - hosted web applications has been accompanied by increasingly sophisticated security attacks and risks that threaten enterprise data. As a result, administrators and security teams face challenges keeping up to date on the latest attacks and protection measures. At the same time, they must meet the stringent compliance requirements for online commerce and data sharing across traditional and cloud environments. Organizations must choose between employing specialized IT security teams in-house - resulting in higher expenses and increased time to deploy policies - or delegating the complex WAF policy management and compliance to a cloud service to drive efficiencies.

    In this webinar you will learn:
    - How application vulnerabilities are evolving
    - The benefits of cloud-based managed and on-premises WAF
    - How to bolster your defenses and ensure mitigation consistency through a “Managed Service” model
    - Don't leave your application or your organization vulnerable

    There will also be a demonstration of our customer portal.
    - Interested in a free trial of Silverline WAF?
    Please visit https://interact.f5.com/SilverlineWAF.html and your dedicated Silverline Account Manager will reach out to start the trial process.
  • Cut through the hype: Real-world strategies for deploying 5G Recorded: Mar 25 2020 60 mins
    Mark Campbell, Sr. Product Mkting Mgr, Service Provider |Andrew Bargery,Solution Architect | Vernon Wells, Solution Architect
    While the business realizations of 5G are still on the horizon, readiness strategies for deployment are already underway. Deploying your 5G infrastructure will likely be the most challenging "next-gen" network rollout ever in terms of scale and scope. Compounding these challenges are simultaneous demands to:

    Rapidly transition to virtualized/cloud-based edge, core and data networks.

    Develop new, compelling services while preventing revenue and/or time-to-market slowdowns caused by potential network complexities.
    Protect your network at massive scale, at every layer, and for multiple threats.

    F5 has been in the trenches with service providers all over the globe as they prepare their transition to 5G services.

    Join this webinar to learn about the strategies that the industry's leading service providers are implementing to ensure a successful 5G transformation, including:

    - Optimized virtualization for predictable, linear scaling and effective fault isolation.

    - Multi-Edge Access Computing (MEC) solutions that can enable deployment of differentiated services.

    - Subscriber-aware technologies for security policy implementations.

    F5 can help you evolve to 5G at your own pace as you seek to optimize, monetize and secure your network

    Register Now
  • Self-Configuring NFV Packaged Solutions for Fast and Flexible Deployments Recorded: Mar 24 2020 52 mins
    Philip Klatte, Senior Product Manager, F5 Networks | James Thomson, Senior Solutions Architect, F5 Networks
    Are NFV solutions really as difficult to implement as they seem? How can Service Providers take the complexity out of virtualizing network functions?

    Watch this webinar to see how F5 packaged NFV solutions make it easy for Service Providers to scale, change out services, and deploy for today’s business strategies—as well as enable the transition to 5G. Find out how F5 is making purchasing, sizing, and deployments of NFV easier.

    Key Takeaways:

    - How to size your service deployments

    - How to deploy new services (and terminate them) at the click of a button

    - How to automate your service deployments from the start

    Register Now
  • Fight the Good Fight Against the Bad Bots Recorded: Mar 19 2020 35 mins
    Brian McHenry, Director, Global Security Solutions, F5 | Graham Alderson, Architect, Global Security Services, F5
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organizations developing a sustainable security strategy.

    Join us for this webinar to learn about:

    - How bots infect, propagate, and attack applications

    - What types of application attacks are commonly performed by bots

    - How you can defend against bad bots without disrupting the good ones

    Register Now
  • How to Integrate Security in Your DevOps Environment Recorded: Mar 18 2020 58 mins
    Peter Silva, Sr. Solutions Marketing Manager, F5 Networks | Nathan McKay, Sr. Product Marketing Manager, F5 Networks
    Application security has two challenges: Keeping pace with the evolution and sophistication of attacks and keeping pace with the speed of modern application development…DevOps.

    Since most breaches start with the application, we cannot ignore the requirement of implementing security controls. But we also need to address the issue of security being too late in the process to be effective.

    In this webinar, you’ll learn how F5 Advanced WAF:

    - Defends web and mobile apps against a range of application attacks such as man-in-the-browser, DoS, credential stuffing, and many more
    Identifies and stops malicious bots that help attackers automate their attacks

    - Helps security “shift left” by integrating into application development CI/CD pipelines

    Register Now
  • TLS 1.3 Explained Recorded: Mar 12 2020 11 mins
    John Wagnon, Sr. Solutions Developer, F5 Networks
    Learn the difference between TLS 1.2 and 1.3, including the security and performance advantages with 1.3
    here are several key changes in the TLS 1.3 protocol such as a requirement to use Perfect Forward Ciphers, and the introduction of a Zero Round Trip Time handshake for session resumption. In this video, F5 security expert John Wagnon outlines many of the important features of this new protocol.
  • The Future Is Configurable: The Evolution of VNF Management Recorded: Mar 10 2020 61 mins
    Jim Hodges, Principal Analyst, Cloud and Security, Heavy Reading | James Thomson, Solution Architect, F5 Networks
    VNF managers (VNFMs) have been an essential component of any virtualized cloud from day one. Although this won't change in the future, as the past few years have illustrated virtualized service instances are no longer bound by any perimeters and will continue to adopt a fully decentralized architecture.

    In response, VNFMs are continuing to evolve to support not only edge services but more "service aware" networks that ultimately mandate a flexible and programmable VNFM product design.

    Will examine in detail how VNFMs are changing to adapt to these new service requirements by supporting advanced capabilities such as configurable capacity, which represents the optimal approach for scaling individual service instances.

    Topics to be addressed include:

    - Documenting in detail configurable capacity, what it is and why it's important

    - Presenting the use cases that are driving the implementation of a configurable capacity-enabled VNFM

    - Analyzing the role of other complementary capabilities including modeling tools such as TOSCA that VNFMs will require to thrive in this emerging service-aware world

    - Considering the security requirements inherent with an edge service architecture

    - An overview of F5's NFV and VNFM portfolio and product development strategy
  • How to Uncover Threats Hiding in Encryption Recorded: Mar 5 2020 50 mins
    Peter Silva, Sr. Solutions Marketing Manager, F5 Networks | Kevin Stewart, Security Solutions Architect, F5 Networks
    With close to 90% of the Internet encrypted and 68% of malware hiding in SSL/TLS web traffic, you may never see the threats lurking in your network. Many of the security inspection tools available today either fail to decrypt that traffic or they introduce latency and complexity, reducing security and scalability.

    Any serious malware threat will try to disguise itself as legitimate SSL/TLS traffic. So how can you see what you’re missing?

    Join this webinar and discover how to:

    - Intelligently decrypt SSL/TLS traffic and orchestrate your security inspection tools.
    - Protect SaaS applications, like Office 365, from malware and other threats.
    - Centralize decryption and re-encryption to increase the lifespan of your existing security devices.

    Register Now
  • Securing 5G Networks: Service Provider Perspective Recorded: Mar 3 2020 60 mins
    Mark Campbell, Application Security, F5 Networks
    The push to commercialize 5G networks is also sharpening the focus on the need to reconsider the security measures that service providers have implemented in their existing mobile networks. And coming to terms with these new requirements is not a trivial feat given how 5G expands service delivery models, introduces a new core reference architecture and even new control plan protocols.

    To gain detailed insight on how service providers plan to secure 5G networks, Heavy Reading in collaboration with research partners F5 Networks and others, launched a comprehensive survey designed to provide a detailed perspective of service provider strategies.

    The survey, which attracted input from more than 100 service provider respondents, addressed a broad spectrum of security-related topics including, security service implementation priorities, preferred core architecture, opex and capex implications, as well the value of advanced capabilities that leverage artificial intelligence, control plane interworking and content inspection.

    This webinar, moderated by Heavy Reading research lead Jim Hodges with subject matter experts from F5 Networks and others will provide a grounded view of the strategies, timeline and concerns that will ultimately determine the steps service providers will take to secure their 5G networks.
  • Protecting Financial Services Mobile Apps Against Bad Bots Recorded: Feb 27 2020 25 mins
    Greg Maudsley, Director Product Marketing, F5 Networks | Jan Sysman, Head of Marketing, Appdome
    Financial Services mobile apps are highly valued targets for hackers and other malicious organizations. Gaining access to these apps provides hackers with the ability to launch attacks aimed at crippling access to financial information for individuals and enterprise organizations, as well as, stealing financial information.

    F5 and Appdome have partnered together making it easier to add Bot Protection to any Android and iOS mobile app in seconds without code or coding.

    F5’s Advanced WAF customers who add bot protection to their servers with the F5 Anti-Bot service, also need to add the F5 Anti-Bot SDK to any mobile app that wants to access information on protected servers.

    Through the partnership with Appdome, F5 makes adding the Anti-Bot SDK fast and easy.

    What You'll Learn:

    - Why bot protection is important

    - How F5 makes bot protection easy with the F5 Anti-Bot service

    - How with Appdome for F5 Anti-Bot you can add the Anti-Bot SDK to any mobile app in seconds without code or coding
  • How to Manage Risk in the Cloud Recorded: Feb 25 2020 60 mins
    Peter Silva, Sr. Solutions Marketing Manager, F5 Networks | Robert Haynes, Principal Technical Marketing, F5 Networks
    Is your security posture better or worse when you deploy or move your applications to the cloud? In some ways the question is irrelevant, since businesses are going to the cloud regardless.

    Cloud allows us to offload many responsibilities to third party providers but ‘risking’ your application security is not one of them. In fact, the use of cloud and other third-party resources is rapidly expanding our attack surface while reducing the visibility and control we have over our applications and data.

    In this webinar you will learn:

    • Which common risks can affect your security in the cloud
    • Which F5 solutions can help reduce those risks
    • How to increase control of your applications in the cloud

    Register Now
  • Joint Security Solutions that Protect your Business with F5 Networks,Cisco & SHI Recorded: Feb 20 2020 38 mins
    Bill Lijewski, SHI | Kevin Gallaugher,F5 Networks | Doug Hurd,Cisco Security | Pradeep Pokhariyal, Cisco Security
    Encryption is everywhere today—and while it’s great for privacy and data security, encryption also lets attackers embed malware and other malicious threats in encrypted traffic, creating security blind spots for organizations.

    Cisco Firepower Threat Defense (FTD) and Web Security Appliance (WSA) are built to block threats, and quickly mitigate any that breach your defenses. But if you deploy Cisco FTD and WSA along with F5 SSL Orchestrator, not only do you optimize their threat mitigation and performance capabilities, you also optimize their ability to stop encrypted threats.

    Together, F5 SSL Orchestrator and Cisco’s FTD and WSA deliver top-of-the-line actionability, availability, and superior orchestration. They increase your security posture and threat mitigation, future-proof your existing investments in security solutions, meet or surpass regulatory compliance requirements, and ensure a superior user experience.

    Join this webinar to learn more about our joint Cisco & F5 Security Solutions.

    We’ll discuss:

    •Common pain points of dealing with encrypted traffic, manual versus automated management scenarios, defocusing core function of existing security solutions, and meeting regulatory compliance pain points

    •The benefits and alignment of a joint Cisco Firepower Threat Defense or Web Security Appliance and F5 SSL Orchestrator solution

    •New ways to manage and solve encrypted traffic blind spots and encrypted threat mitigation

    Register Now
  • Solving The Problem Of TLS Visibility Recorded: May 29 2019 11 mins
    John Wagnon
    The F5 SSL Orchestrator (SSLO) provides a powerful solution to the problem of TLS encryption visibility. Most of the traffic on the Internet today is encrypted, so organizations have to figure out how to reliably inspect that encrypted traffic. Some solutions require a "daisy-chain" of security devices to inspect the traffic, but the F5 SSLO allows encryption/decryption to happen in one place. The SSLO "orchestrates" the traffic by implementing policies that direct traffic to one or more of the security devices depending on what type of traffic it is. The SSLO also solves the problem of cipher diversity by offering one set of cipher suites to external devices and another set of cipher suites to internal devices. Learn about all this and more as John outlines the details of the SSL Orchestrator!
  • How to Gain Visibility into Encrypted Threats Recorded: Apr 17 2019 39 mins
    Jay Kelley, Principal Product Marketing Manager - F5 Networks Peter Silva, Security Solutions Marketing Manager - F5 Networks
    Driven by built-in web browser warnings, the EU GDPR, and general security and privacy awareness, encrypting data-in-transit with SSL/TLS is now a standard practice among many organizations. This is a great win for security overall to help prevent data breaches, however cyber criminals are using these encrypted channels to propagate malware and exfiltrate data knowing they can bypass traditional security inspection solutions that don’t decrypt traffic.

    Join this webinar to learn more about:

    - Challenges with encrypted traffic and risks to your business
    - How to efficiently decrypt and orchestrate traffic to reduce latency
    - How to intelligently manage decryption and re-encryption across all of your security inspection solutions (IDS/IPS, NGFW, Malware Sandbox, etc.)
  • How to Gain Visibility into Encrypted Threats Recorded: Dec 26 2018 40 mins
    Jay Kelley, Principal Product Marketing Manager - F5 Networks Peter Silva, Security Solutions Marketing Manager - F5 Networks
    Driven by built-in web browser warnings, the EU GDPR, and general security and privacy awareness, encrypting data-in-transit with SSL/TLS is now a standard practice among many organizations. This is a great win for security overall to help prevent data breaches, however cyber criminals are using these encrypted channels to propagate malware and exfiltrate data knowing they can bypass traditional security inspection solutions that don’t decrypt traffic.

    Join this webinar to learn more about:

    - Challenges with encrypted traffic and risks to your business
    - How to efficiently decrypt and orchestrate traffic to reduce latency
    - How to intelligently manage decryption and re-encryption across all of your security inspection solutions (IDS/IPS, NGFW, Malware Sandbox, etc.)
  • Defense Intense - Portable Multi-Cloud Security for the Agile Era Recorded: Dec 26 2018 57 mins
    Nathan Mckay- Solutions Marketing Manager, F5 Networks Robert Haynes- Cloud Technical Marketing, F5 Networks
    Defending apps in the cloud can be difficult – especially if you are pursuing a multi-cloud strategy. No matter where you deploy, your apps need resilience, which means robust defenses to ensure their continued availability. Ensure your customers (and their data) get the protection they need in the face of current and emergent threats. Not all risks are related to software vulnerabilities - some, such as “credential stuffing”, are inherited from breaches that have occurred elsewhere.

    Portable, proactive security is possible. Make sure your development teams have access to the tools they need to enable them to move fast while still delivering the confidentiality, integrity, and availability your customers expect and deserve. There are lots of options; be sure to leverage the ones best suited to protect your technology platforms and business priorities.

    In this webinar you will learn:

    - How to build an application protection strategy that will proactively protect your assets across clouds
    - How you can go beyond vulnerability management and address real business risks, such as denial of service, fraud, and intellectual property theft
    - How multi-cloud can help you stay ahead of your competitors and reap the rewards of economy scale and pricing
    - How F5 can help your organization identify and solve problems that are impacting your bottom line
Think App Security First
Weather it's apps that help connect businesses to their customers or apps that help employees do their jobs - we make sure apps are always available and secure, anywhere.
Visit F5 at: https://www.f5.com/company

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Leveraging the Power of Threat Intelligence
  • Live at: Mar 15 2017 5:30 pm
  • Presented by: Ray Pompon and Sara Boddy of F5
  • From:
Your email has been sent.
or close