BIG-IP APM Best Practices Part 2 – Live Walkthrough

Logo
Presented by

Corey Marshall, Director and Sr. Security Solutions Architect,F5 |Chas Lesley, Sr. SE,F5 |Lee Slaughter, F5

About this talk

Our first webinar — BIG-IP Access Policy Manager Best Practices — covered a handful of best practices on how to quickly scale up and maintain operations. As COVID-19 looks to have given us a new normal, it’s now time to think about longer term strategies to support a larger remote workforce. In our upcoming webinar— BIG-IP APM Best Practices Part 2 – Live Walkthrough — we’ll dive deeper into best practices for remote access that support your security and productivity requirements, including live demos. Join this webinar to learn how to: - Provide your users a smoother and more secure access experience featuring Identity Aware Access Proxy - Quickly remediate vulnerable remote desktop (RDP) exposure with secure privileged access - Easily increase security of SSH connections with ephemeral access - Protect your remote access logins from brute force and cred stuffing attacks with Shape Security integration Register Today
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (292)
Subscribers (13569)
F5 is a multicloud application security and delivery company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure every app—on premises, in the cloud, or at the edge. F5 enables businesses to continuously stay ahead of threats while delivering exceptional, secure digital experiences for their customers. For more information, go to f5.com.