BIG-IP APM Best Practices Part 2 – Live Walkthrough

Presented by

Corey Marshall, Director and Sr. Security Solutions Architect,F5 |Chas Lesley, Sr. SE,F5 |Lee Slaughter, F5

About this talk

Our first webinar — BIG-IP Access Policy Manager Best Practices — covered a handful of best practices on how to quickly scale up and maintain operations. As COVID-19 looks to have given us a new normal, it’s now time to think about longer term strategies to support a larger remote workforce. In our upcoming webinar— BIG-IP APM Best Practices Part 2 – Live Walkthrough — we’ll dive deeper into best practices for remote access that support your security and productivity requirements, including live demos. Join this webinar to learn how to: - Provide your users a smoother and more secure access experience featuring Identity Aware Access Proxy - Quickly remediate vulnerable remote desktop (RDP) exposure with secure privileged access - Easily increase security of SSH connections with ephemeral access - Protect your remote access logins from brute force and cred stuffing attacks with Shape Security integration Register Today

Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (180)
Subscribers (6878)
At F5, our mission is based on the fact that businesses depend on apps. Our long-standing belief that applications are the most valuable assets of any organization in the digital age has been the foundation of our strategy to become the leader in multi-cloud application services. When you combine F5 and NGINX's expertise powering over half of the world's applications across all types of environments, with Shape's insight from mitigating 1 billion application attacks per day, you have a company that knows how to deliver and secure more applications, and more value, than any company in the industry. This means that we are able to deliver and protect applications—revenue generating, brand-anchoring applications—from the point at which they are created through to the point where consumers interact with them. In other words, from "code to customer." This makes the combined forces of F5, NGINX, and Shape absolutely essential to every digital organization in the world, including the world's largest enterprises, service providers, financial and educational institutions, government entities, and consumer brands. Visit F5 at: