BIG-IP APM Best Practices Part 2 – Live Walkthrough
Presented by
Corey Marshall, Director and Sr. Security Solutions Architect,F5 |Chas Lesley, Sr. SE,F5 |Lee Slaughter, F5
About this talk
Our first webinar — BIG-IP Access Policy Manager Best Practices — covered a handful of best practices on how to quickly scale up and maintain operations. As COVID-19 looks to have given us a new normal, it’s now time to think about longer term strategies to support a larger remote workforce.
In our upcoming webinar— BIG-IP APM Best Practices Part 2 – Live Walkthrough — we’ll dive deeper into best practices for remote access that support your security and productivity requirements, including live demos.
Join this webinar to learn how to:
- Provide your users a smoother and more secure access experience featuring Identity Aware Access Proxy
- Quickly remediate vulnerable remote desktop (RDP) exposure with secure privileged access
- Easily increase security of SSH connections with ephemeral access
- Protect your remote access logins from brute force and cred stuffing attacks with Shape Security integration
Register Today
F5 is a multicloud application security and delivery company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure every app—on premises, in the cloud, or at the edge. F5 enables businesses to continuously stay ahead of threats while delivering exceptional, secure digital experiences for their customers. For more information, go to f5.com.
…