Stamping out Security: The move toward inherently applied security policy

Logo
Presented by

Nathan McKay, Security Solutions Marketing Manager

About this talk

Ensuring adherence to the variety of industry and organizational security requirements can be a daunting task for development teams, application owners, and network operators alike. Security policy authors and owners don’t always have the best visibility or technical involvement in application development and deployment. This can necessitate a lot of facilitation on the part of security operation teams to ensure that policy is being met and adhered to not just during the implementation phase, but over the lifecycle of an application. Using application delivery templatization tools such as iApps and iWorkflow, we can build technical security controls right into our application delivery toolkits once, and have deployed apps automatically inherit pre-approved technical measures that ensure that security policy is not only applied at delivery time, but remains firmly in place for the lifecycle of the application. Let app owners worry about the app and simply inherit the technical measures requisite to get their app out the door with the right controls, right now. This presentation was originally delivered at the F5 Agility conference August, 2017.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (285)
Subscribers (13756)
F5 is a multicloud application security and delivery company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure every app—on premises, in the cloud, or at the edge. F5 enables businesses to continuously stay ahead of threats while delivering exceptional, secure digital experiences for their customers. For more information, go to f5.com.