BIG-IP APM Best Practices Part 2 – Live Walkthrough

Presented by

Corey Marshall, Director and Sr. Security Solutions Architect,F5 |Chas Lesley, Sr. SE,F5 |Lee Slaughter, F5

About this talk

Our first webinar — BIG-IP Access Policy Manager Best Practices — covered a handful of best practices on how to quickly scale up and maintain operations. As COVID-19 looks to have given us a new normal, it’s now time to think about longer term strategies to support a larger remote workforce. In our upcoming webinar— BIG-IP APM Best Practices Part 2 – Live Walkthrough — we’ll dive deeper into best practices for remote access that support your security and productivity requirements, including live demos. Join this webinar to learn how to: - Provide your users a smoother and more secure access experience featuring Identity Aware Access Proxy - Quickly remediate vulnerable remote desktop (RDP) exposure with secure privileged access - Easily increase security of SSH connections with ephemeral access - Protect your remote access logins from brute force and cred stuffing attacks with Shape Security integration Register Today

Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (208)
Subscribers (8285)
F5 specializes in application delivery networking(ADN), application availability & performance, multi-cloud management, application security, network security, access & authorization and online fraud prevention. Visit F5 at: