Introducing F5's first SaaS-based Web Application Protection Solution
The F5 DNS Cloud Service offers an expertly architected, globally distributed, anycast front-ended DNS architecture with built-in DDoS protection.
In this session we’ll show you how you can quickly and easily subscribe to the service and migrate your DNS service to the cloud with just a few clicks. Roll out F5 DNS Cloud Service in minutes. Pay for what you use, scale on demand.
RecordedJun 3 202016 mins
Your place is confirmed, we'll send you email reminders
Apps live anywhere today and can be accessed from everywhere, anytime. As the perimeter vanishes, the risk landscape increases and threats mount and become more sophisticated. “Trust, but verify” is replaced by “Never trust, always verify.” Apps are the front door to critical, sensitive data, so you must ensure that only the right users access the right apps at the right time with the right device and right configuration, from the right place. And they need to be able to do all of it simply. An identity-aware proxy drives Zero Trust app access.
Geoff Pattersen, Sr. Mgr Product Mgmt., F5 | John Howell, Sr. Global Solution Architect, F5
As service providers are preparing for the 5G transition, security continues to be top of mind. Security for new services must be both easy to manage and cost-effective. Automation and virtualization play a critical role in helping security teams be operationally efficient—doing more with less. F5 provides security solutions to the largest services providers globally.
This session will cover how F5 can help you design in security at every critical point of the infrastructure—at the edge, in the data center, and everywhere in between.
Jason Feldt, Director of Product Management, NGINX Analytics, F5
NGINX offers what you need to gain end-to-end visibility across multiple app services so you can provide powerful insights and meet SLAs with customers without having to aggregate output from disparate monitoring tools. And if you already have CI/CD analytics tools you know and love, NGINX can integrate with those, too.
F5 Labs has spent the past three years analyzing and combining data on cyber-attacks from a variety of F5 internal sources and external partners including breach data, surveys of security pros, malware forensics, global honeypot nets, and customer incident reports.
We'll dive into the top threats, broken out by industry sector, region, and technological platform.
The ability to find and address the root cause of application failure is getting more difficult as multi-cloud application deployments grow. AppDevs, DevOps, and NetOps all need deep app health visibility and simplified troubleshooting on a per-app and per-user basis, across operating environments, multiple clouds, and F5 devices—and now they can get it.
In this session, we'll see how F5 BIG-IQ provides a single source of truth across teams.
SecOps and DevOps don’t often share the same objectives. The DevOps requirement for speed and efficient automation doesn’t always accommodate adequate security integrations.
In this demonstration we will show how to integrate F5 leading application protection solutions into Agile development environments so that security can “shift left” as a component of the automated CI/CD pipeline.
Lori MacVittie, Principal Technical Evangelist,Office of CTO, F5 | Cindy Borovick, Strategy Director, F5
This session will explore the results of our latest research on application services providing insights on how they deliver high-quality customer experiences to drive engagement and effectively implement security to build trust.
We will discuss why the adoption of multi-cloud and automation and orchestration are driving application services adoption and deployment.
Microservices have a profound effect on the way applications are developed, deployed, and updated. With APIs at the heart of a microservices architecture, we explore the technical and procedural challenges, and how they put pressure on conventional API gateway and API management solutions.
This session will also provide an overview of NGINX API architecture and deployment patterns and how they can be optimized for microservices.
This demo will take you through how BIG-IQ Centralized Management can help every user keep their finger on the pulse of their app services, inject automation and self-service into their workflows, and quickly and efficiently respond to problems when they occur.
The next generation of mobile networks—also known as 5G—is already here. 5G brings a new set of network functions where ultra-low latency, enhanced mobile broadband, and massive IoT enable new categories of applications.
In this session we will talk about how technologies developed by F5 can help you modernize your network and enable efficient transition to a 5G Service-Based Architecture and beyond.
Security often cannot keep up with the pace of modern application development, however leaving applications unprotected is simply not an option. Essential App Protect is F5’s first SaaS application security solution specifically designed to help keep up with development while at the same time taking the complexity out application security.
In this session we showcase this new developer-friendly solution that provides rapid, out-of-the box protection your web applications.
Tim Wagner, Principal Cloud Evangelist | Yossi Rosenbaum | Jon Calalang | Heath Parrot | Terri Patrick
Getting your apps from code to customer, from development to delivery, has never been more complex. And the pressure to get to market faster intensifies every day. So how do you evaluate solutions to make sure you’re effectively meeting immediate needs and addressing long-term business outcomes?
In this webinar, a team of F5 solution architects and evangelists explore how and why decision making around technology and solutions is evolving.
- What’s changed about how organizations make technology solution choices?
- Criteria you can use to minimize operational risk.
- Conversations that need to happen between teams when evaluating solutions.
- How systems, table stakes, and baselines should figure into your decision making.
- How to make sure the tech choices you make scale.
The F5 Silverline Security Operations Center's (SOC) team of “unicorns” becomes an extension of your security team and eliminates the complexity of initial and ongoing management for both WAF and DDoS services.
In this session, you will learn about real customer attacks, including modern application, boy, API, and DDoS attacks and how F5 Silverline Managed Services protects against them.
Jonathan George, Manager Product Marketing, F5 | Adil Laari, Sr. Product Manager, F5
Applications are the driving force behind value creation in the age of digital transformation. Gaining insights into not only your application inventory, but also the health of those applications that comprise your portfolio is the cornerstone of properly managing and leveraging your application capital.
In this session, learn how the F5 Beacon app visibility and analytics offering can be used to maximize the value of your applications to your business and your customers—all in a SaaS solution.
John Morgan—General Manager of the F5 Security Cross-Product Group—will describe how F5 and Shape can protect your applications from today’s threats, and tomorrow’s, so your applications remain available, are accessible by the right people with access to the right information, and ultimately ensure the integrity of your data and brand.
In this session, we’ll cover the latest innovations in the BIG-IP platforms space and discuss the strategies to harvest the value of your F5 footprint on premises, while you move to the cloud.
You will learn about why you need to refresh your aging hardware, transition to BIG-IP VE when hardware is not suitable, and upgrade your BIG-IP software to take advantage of the latest features and functionality.
Corey Marshall, Director and Sr. Security Solutions Architect,F5 |Chas Lesley, Sr. SE,F5 |Lee Slaughter, F5
Our first webinar — BIG-IP Access Policy Manager Best Practices — covered a handful of best practices on how to quickly scale up and maintain operations. As COVID-19 looks to have given us a new normal, it’s now time to think about longer term strategies to support a larger remote workforce.
In our upcoming webinar— BIG-IP APM Best Practices Part 2 – Live Walkthrough — we’ll dive deeper into best practices for remote access that support your security and productivity requirements, including live demos.
Join this webinar to learn how to:
- Provide your users a smoother and more secure access experience featuring Identity Aware Access Proxy
- Quickly remediate vulnerable remote desktop (RDP) exposure with secure privileged access
- Easily increase security of SSH connections with ephemeral access
- Protect your remote access logins from brute force and cred stuffing attacks with Shape Security integration
Weather it's apps that help connect businesses to their customers or apps that help employees do their jobs - we make sure apps are always available and secure, anywhere.
Visit F5 at: https://www.f5.com/company