Hi [[ session.user.profile.firstName ]]

DEMO: A Window into Your Apps: Seeing and Solving Problems with BIG-IQ

This demo will take you through how BIG-IQ Centralized Management can help every user keep their finger on the pulse of their app services, inject automation and self-service into their workflows, and quickly and efficiently respond to problems when they occur.
Recorded Jul 14 2020 15 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Zach Westall, Product Marketing Manager, BIG-IQ, F5
Presentation preview: DEMO: A Window into Your Apps: Seeing and Solving Problems with BIG-IQ

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Integrate Security Into App Development Recorded: Aug 13 2020 9 mins
    Byron McNaught, F5 Networks
    Get the latest intel on the app threats that matter.

    As more application development moves into an Agile methodology, security often lags behind. Besides the shift in culture and mindset required to ensure security throughout the reimagined SDLC, legacy tools need to be updated so they’re not a hinderance to application release frequency.

    Learn how the F5 Advanced Web Application Firewall (WAF) protects against a variety of attacks while providing critical feedback earlier in the SDLC process to reduce costs and speed up time to market.

    Register Today
  • Reduce Your App Threat Surface and Improve User Experience Recorded: Aug 13 2020 16 mins
    Jay Kelley, Principal Product Marketing Manager - F5 Networks
    Get the latest intel on the app threats that matter.

    The majority of breaches in the US in 2019 were the result of access-related attacks. Why? An explosion of applications residing in multiple cloud environments have created complexity while previously breached username and password combinations have created new common attack types.

    Learn how the F5 zero-trust solution integrates with your favorite identity as a service to deliver single sign on for ALL apps, regardless of where they reside, and provides an enhanced, per request, inspection to ensure appropriate access.

    Register Today
  • How to Protect Against Encrypted Threats Recorded: Aug 12 2020 7 mins
    Lee Slaughter, F5 Networks
    Get the latest intel on the app threats that matter.

    SSL/TLS (encryption of data-in-transit) is used in the overwhelming majority of web and data center traffic. While this is great for privacy, it creates challenges for organizations that need to inspect ingress or egress traffic for malware or other threats.

    Learn about the F5 solution that centralizes the ability decrypt traffic, orchestrates to multiple inspection tools, and re-encrypts all, based on custom policies that fit your needs.

    Register Today
  • Financial Aggregators: Friends, Foes, or Attack Surface? Recorded: Aug 11 2020 46 mins
    Dan Woods, VP Shape Intelligence Center, Shape Security now part of F5
    Third-party financial aggregators might make life easier for users, but they can be a new attack vector for those looking to defraud your institution and its customers.

    Each time a new list of leaked credentials goes into circulation, criminals use them for credential-stuffing attacks on aggregators, as well as other targets. Once working aggregator credentials have been identified, attackers move on to siphon funds out of their victims’ accounts.

    Furthermore, some aggregators explicitly aim to use their positions to disintermediate banks and other financial institutions from their customers.

    What steps can banks take to:

    Protect their infrastructure?
    Protect their customers?
    Enforce the API use agreements that they have entered with the aggregators?

    Register Today
  • Defeat BOT Attacks with New Silverline Shape Defense Managed Service Recorded: Aug 6 2020 48 mins
    Brian Uffelman, Sr Manager Product Marketing, Shape Security, a F5 Company | Luke Lehman, Product Mgr, F5 Silverline
    Today’s applications have become the fabric of our economies and our lives. Applications are how value is exchanged and where the most sensitive data is stored. And that’s precisely why applications have become the focal point for cybercriminals, who target your applications for financial fraud and abuse.

    In this webinar, learn how Silverline Shape Defense – the newest solution in F5’s Silverline managed services portfolio – protects your web apps from bots and other automated attacks by delivering continuous protection, even when attackers retool.

    We will discuss tactics to help you:

    - Slash losses due to fraud and abuse Deliver better application performance and uptime

    - Achieve measurable cost savings for hosting and bandwidth costs

    - Prevent sophisticated attacks including those on the OWASP Automated Threats to Web Applications list

    - Detect and mitigate vulnerability exploits and denial-of-service attacks

    Register Today
  • F5 ACI Servicecenter - Bring L4-L7 to ACI through programmability Recorded: Aug 5 2020 60 mins
    Payal Singh, Solutions Architect, F5 | Patrick Campbell, Sr. Business Development Manager, F5
    Learn how to manage the F5 BIG-IP in your ACI + BIG-IP deployment by leveraging the F5 Automation Toolchain and ACI’s programmable App Center framework.

    Key Learning Objectives:

    This simple and native integration aims to solve important real world use cases:

    - Deep infrastructure visibility into the ACI and F5 deployment, and
    - Network as well as application management on BIG-IP.

    Each use case can be automated due to the SDN capabilities provided by Cisco APIC.

    Join us to understand how you can leverage APIs to achieve end-to-end network automation workflows and learn how different personas within your organization can benefit from these features and functionalities.

    Register Today
  • The Castle Walls Have Fallen: Zero-Trust App Access Recorded: Aug 4 2020 20 mins
    Jay Kelley, Principal Product Marketing, F5
    Apps live anywhere today and can be accessed from everywhere, anytime. As the perimeter vanishes, the risk landscape increases and threats mount and become more sophisticated. “Trust, but verify” is replaced by “Never trust, always verify.” Apps are the front door to critical, sensitive data, so you must ensure that only the right users access the right apps at the right time with the right device and right configuration, from the right place. And they need to be able to do all of it simply. An identity-aware proxy drives Zero Trust app access.
  • Protect All Layers of your Network at Massive Scale Recorded: Jul 29 2020 19 mins
    Geoff Pattersen, Sr. Mgr Product Mgmt., F5 | John Howell, Sr. Global Solution Architect, F5
    As service providers are preparing for the 5G transition, security continues to be top of mind. Security for new services must be both easy to manage and cost-effective. Automation and virtualization play a critical role in helping security teams be operationally efficient—doing more with less. F5 provides security solutions to the largest services providers globally.

    This session will cover how F5 can help you design in security at every critical point of the infrastructure—at the edge, in the data center, and everywhere in between.

    Register Now
  • Using NGINX to Optimize Your Business Recorded: Jul 28 2020 14 mins
    Jason Feldt, Director of Product Management, NGINX Analytics, F5
    NGINX offers what you need to gain end-to-end visibility across multiple app services so you can provide powerful insights and meet SLAs with customers without having to aggregate output from disparate monitoring tools. And if you already have CI/CD analytics tools you know and love, NGINX can integrate with those, too.

    Please Join Us, Register Today
  • What Threat Intelligence Can Teach Us to Help Secure Our Applications Recorded: Jul 23 2020 18 mins
    Ray Pompon, F5 Labs
    F5 Labs has spent the past three years analyzing and combining data on cyber-attacks from a variety of F5 internal sources and external partners including breach data, surveys of security pros, malware forensics, global honeypot nets, and customer incident reports.

    We'll dive into the top threats, broken out by industry sector, region, and technological platform. 

    Please Join Us, Register Today
  • Troubleshooting Application Health and Performance with F5 BIG-IQ Recorded: Jul 22 2020 14 mins
    Zach Westall, Product Marketing Manager, BIG-IQ, F5
    The ability to find and address the root cause of application failure is getting more difficult as multi-cloud application deployments grow. AppDevs, DevOps, and NetOps all need deep app health visibility and simplified troubleshooting on a per-app and per-user basis, across operating environments, multiple clouds, and F5 devices—and now they can get it.

    In this session, we'll see how F5 BIG-IQ provides a single source of truth across teams.

    Register Today
  • DEMO: Integrating F5 Application Security into the CI/CD Pipeline Recorded: Jul 21 2020 10 mins
    Mark Campbell, Sr. Manager Product Marketing, F5
    SecOps and DevOps don’t often share the same objectives. The DevOps requirement for speed and efficient automation doesn’t always accommodate adequate security integrations.

    In this demonstration we will show how to integrate F5 leading application protection solutions into Agile development environments so that security can “shift left” as a component of the automated CI/CD pipeline.

    Register Today
  • The State of Application Services: The Impact of Digital Transformation Recorded: Jul 16 2020 26 mins
    Lori MacVittie, Principal Technical Evangelist,Office of CTO, F5 | Cindy Borovick, Strategy Director, F5
    This session will explore the results of our latest research on application services providing insights on how they deliver high-quality customer experiences to drive engagement and effectively implement security to build trust.

    We will discuss why the adoption of multi-cloud and automation and orchestration are driving application services adoption and deployment.

    Register Today
  • Security Operations Policy Compliance Through Visibility and Accountability Recorded: Jul 15 2020 17 mins
    Roopak Patel, Director Product Management, Security Group, F5
    Learn how the entire application protection experience can be streamlined while maintaining the desired security risk posture to deliver great experience to your customers.

    Register Today
  • Illuminating the Impact of Microservices and API Management Recorded: Jul 14 2020 24 mins
    Liam Crilly, Director Product Management, NGNIX
    Microservices have a profound effect on the way applications are developed, deployed, and updated. With APIs at the heart of a microservices architecture, we explore the technical and procedural challenges, and how they put pressure on conventional API gateway and API management solutions.

    This session will also provide an overview of NGINX API architecture and deployment patterns and how they can be optimized for microservices.

    Register Today
  • DEMO: A Window into Your Apps: Seeing and Solving Problems with BIG-IQ Recorded: Jul 14 2020 15 mins
    Zach Westall, Product Marketing Manager, BIG-IQ, F5
    This demo will take you through how BIG-IQ Centralized Management can help every user keep their finger on the pulse of their app services, inject automation and self-service into their workflows, and quickly and efficiently respond to problems when they occur.
  • F5 5G Vision Recorded: Jul 9 2020 8 mins
    Ashkan Karimi, Director Product Management, F5
    The next generation of mobile networks—also known as 5G—is already here. 5G brings a new set of network functions where ultra-low latency, enhanced mobile broadband, and massive IoT enable new categories of applications.

    In this session we will talk about how technologies developed by F5 can help you modernize your network and enable efficient transition to a 5G Service-Based Architecture and beyond.

    Register Today
  • F5's Unified Architecture Vision Recorded: Jul 9 2020 47 mins
    Ging Lin, Chief Technology Officer, F5
    Geng Lin—F5’s Chief Technology Officer—will share F5’s unified architecture vision, in which applications are powered by Artificial Intelligence (AI) to deliver actionable business value.
  • Introducing F5's first SaaS-based Web Application Protection Solution Recorded: Jul 8 2020 16 mins
    Mark Campbell, Application Security, F5
    Security often cannot keep up with the pace of modern application development, however leaving applications unprotected is simply not an option. Essential App Protect is F5’s first SaaS application security solution specifically designed to help keep up with development while at the same time taking the complexity out application security.

    In this session we showcase this new developer-friendly solution that provides rapid, out-of-the box protection your web applications.

    Register Today
  • The Path to Capturing Value from the Application Economy Recorded: Jul 7 2020 12 mins
    Benito Lopez, Sr. Manager Business Development, F5
    F5 is leading the way to help transform service provider networks by creating application-centric networking capabilities to enable the development of new services and business models.

    In this session, we’ll share F5’s vision for an exciting new era in self-optimizing, programmable networks, as well as solutions for application-centric networking, security, analytics, and the cloud. 

    Register Today
Think App Security First
At F5, our mission is based on the fact that businesses depend on apps.
Our long-standing belief that applications are the most valuable assets of any organization in the digital age has been the foundation of our strategy to become the leader in multi-cloud application services. When you combine F5 and NGINX's expertise powering over half of the world's applications across all types of environments, with Shape's insight from mitigating 1 billion application attacks per day, you have a company that knows how to deliver and secure more applications, and more value, than any company in the industry.
This means that we are able to deliver and protect applications—revenue generating, brand-anchoring applications—from the point at which they are created through to the point where consumers interact with them. In other words, from "code to customer." This makes the combined forces of F5, NGINX, and Shape absolutely essential to every digital organization in the world, including the world's largest enterprises, service providers, financial and educational institutions, government entities, and consumer brands.

Visit F5 at: https://www.f5.com/company

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: DEMO: A Window into Your Apps: Seeing and Solving Problems with BIG-IQ
  • Live at: Jul 14 2020 3:00 pm
  • Presented by: Zach Westall, Product Marketing Manager, BIG-IQ, F5
  • From:
Your email has been sent.
or close