BIG-IP APM Best Practices Part 2 – Live Walkthrough
Presented by
Corey Marshall, Director and Sr. Security Solutions Architect,F5 |Chas Lesley, Sr. SE,F5 |Lee Slaughter, F5
About this talk
Our first webinar — BIG-IP Access Policy Manager Best Practices — covered a handful of best practices on how to quickly scale up and maintain operations. As COVID-19 looks to have given us a new normal, it’s now time to think about longer term strategies to support a larger remote workforce.
In our upcoming webinar— BIG-IP APM Best Practices Part 2 – Live Walkthrough — we’ll dive deeper into best practices for remote access that support your security and productivity requirements, including live demos.
Join this webinar to learn how to:
- Provide your users a smoother and more secure access experience featuring Identity Aware Access Proxy
- Quickly remediate vulnerable remote desktop (RDP) exposure with secure privileged access
- Easily increase security of SSH connections with ephemeral access
- Protect your remote access logins from brute force and cred stuffing attacks with Shape Security integration
Register Today