How to Improve the ROI of SSL/TLS Visibility Solutions - Featuring Forrester
Forrester Consulting recently conducted a commissioned Total Economic Impact™ study on behalf of F5, showing an analysis of F5’s SSL/TLS Visibility solution and found that the average customer will see an ROI of 373%.
Join F5 and guest speakers from Forrester as they walk through the details of the financial analysis to understand the benefits that F5 brings when combatting security threats that hide within encrypted traffic.
In this webinar, you’ll learn:
- Why visibility into encrypted traffic is critical to your security program.
- How F5’s approach provides operational efficiencies in managing your security inspection tools like Next-Gen Firewalls, Web Application Firewalls, malware sandboxes, and more.
- The ROI you can expect from investing in F5’s SSL/TLS visibility solution.
RecordedOct 28 202045 mins
Your place is confirmed, we'll send you email reminders
Lori Mac Vittie, Principal Evangelist, F5 Office of the CTO | Cindy Borovick, Market and Competitive Strategy Lead, F5
2021 State of Application Strategy Report: Digital Transformation Pushing Us To The Edge
Improving connectivity, reducing latency, ensuring security, and leveraging data insights are driving organizations to rearchitect the global network with renewed focus on the edge. The edge—which is different for each industry and business function—enables new services and better performance by placing applications as close as possible to the sources and users of data.
In this webinar, we dig into the results of our 2021 State of Application Strategy survey results and discuss:
- Why IT leaders must deliver a unified security strategy to protect infrastructure, applications and the business
- How telemetry and analytics at the edge will turn large volumes of data into business insights
- Why standardization across multi-cloud cloud and automation are critical to meeting SLAs and overcoming skill set challenges
To make Kubernetes production grade, you need to add three components. In this session, we’ll focus on the third component: the service mesh. A service mesh provides fine-grained traffic management and security to application services within the cluster. We’ll demystify the complexity of Kubernetes networking and discuss where F5 can help when you’re ready to take the mesh leap, including: * Service mesh basics * Service mesh readiness checklist * How to choose service mesh * An overview of NGINX Service Mesh and Aspen Mesh
To make Kubernetes production grade, you need to add three components. In this session, we’ll focus on the second component: built-in security. While “coarse-grained” security might be sufficient outside the cluster, “fine-grained” security is required inside it. We’ll explore the ways you can enable production-grade security within Kubernetes, including: * Trends and challenges of securing Kubernetes at scale * How to simplify and secure your environment by centralizing WAF and Authentication at the pont of Ingress. * Why and where to duplicate your WAF, both within and outside of Kubernetes. * An overview of NGINX Ingress Controller and NGINX App Protect.
Peter Scheffler, Sr. Solutions Architect, F5 | Joe Martin, Security Solution Architect, F5 | Gee Chow,Devops Specialist, F5
Applications are architected in many ways, but all need protection from threats. Despite the industry’s best efforts to strengthen secure application development practices, decentralised and complex application deployments are difficult to protect.
The good news is that there are tools to help you bolster your apps against breaches by mitigating vulnerabilities and stopping attacks: Web Application Firewalls (WAFs)
Are you planning to refresh your current WAF solution? Are you moving your apps to modern environments? Join this webinar to help you choose the right WAF deployment model for your business – Self-managed, Cloud-delivered (SaaS), or Managed service.
We will cover:
• Pros and cons of different WAF deployment options
• Advanced protections
• Behavioural analytics
• Proactive bot protection
• API security
• Integration into app dev lifecycle (CI/CD pipeline)
To make Kubernetes production grade, you need to add three components. In this session, we’ll focus on the first component: the Ingress controller. An Ingress controller is a specialized load balancer that abstracts away the complexity of Kubernetes networking and bridges between services in a Kubernetes cluster and those outside it. We'll look at: * Use cases and requirements that should inform your selection of an Ingress controller *The features and capabilities that make an Ingress controller "production-grade' *An overview of the NGINX Ingress Controller
With the massive shift to work-from-home caused by COVID-19, many organizations rapidly deployed VPN and other remote access solutions to their workforces. These approaches present both rewards and risks to an organization’s overall security posture.
In this webinar, we will identify four major risk areas: overall network architecture, access control, denial-of-service, and endpoints.
Key Learning Objectives:
- How VPNs can change an organization’s network security posture in unexpected ways
- Insights into the importance of authentication and VPN Application Risks
- Understand the issues with end user bandwidth and networking and the complexities of troubleshooting access issues when VPN is involved.
No matter how you define it, the Site Reliability Engineering (SRE) is clearly becoming more and more widespread in traditional IT teams. In this session, you will be up to speed on some SRE principles and best practices. We will explore how F5, in combination with Red Hat® OpenShift® and other ecosystem technologies, can empower SRE to deploy, scale, and secure modern applications.
F5 is excited to announce the launch of F5 Cloud DNS – Primary DNS Service. DNS specialists, network engineers, and DevOps teams now have the ability to easily and fully manage their DNS infrastructure optimized for today’s modern, cloud-native apps in just a few clicks. This service empowers you to deliver applications across hybrid and multi-cloud environments, scale instantly, and improve productivity with automation and DevOps integration.
At the heart of modern application architectures is the HTTP API. APIs enable applications to be built rapidly, maintained easily, and scaled at will. API gateways are typically deployed as an additional layer in the application delivery environment, bringing additional complexity and points of failure. In this session, you’ll learn how to deploy NGINX—the most pervasive load balancer, reverse proxy, and web server—as an API gateway.
Apps are how the modern enterprise materializes the consumer expectation of positive digital experiences. However, ensuring those apps can deliver on that promise by performing well, running securely, and remaining available is extremely difficult—especially with large portfolios of apps and services. Join this session to learn about the benefits of adopting a centralized, app-centric approach for managing, gaining visibility into, and automating your BIG-IP deployments.
Join this session to hear the latest insights from the F5 Labs Application Protection Research Series. We'll share insights from the past four years of data analysis on breach data, global honeypot nets, vulnerability analysis, and customer incident reports, including details on how the pandemic changed cybersecurity and what new threats emerged.
Modern apps require modern deployment models that simplify and accelerate repeatable rollouts while minimizing errors. Join this breakout session to learn how F5's modern declarative APIs can enable app services deployment automation while abstracting configuration complexity away.
For financial services institutions, keeping gross fraud loss in check isn’t a choice—it’s a business imperative. With the proliferation of apps that have adopted anti-bot technologies, attackers are finding it difficult to identify soft targets, especially in banking. Instead of expending resources in an attempt to circumvent anti-automation technologies, fraudsters are pivoting and attacking unprotected email servers that become the steppingstone to the ultimate goal: your customer accounts.
Join this webinar to learn:
- The latest threats from organized crime rings related to the credential marketplace landscape.
- Observations and evidence around how fraudsters are increasingly reverting to manual (i.e., human-driven) fraud methods, and how to stop them.
- The latest machine learning algorithms trained by attack profile, risk surface, and historical fraud records that specifically protect banks, credit unions, and other financial institutions.
Michele Evermore, Dept of Labor|Michael Harrington,Dept of Labor | Shelley Zumwalt,Employment Security| Saurabh Bajaj, F5
Across the country, fraud is overwhelming many states’ unemployment systems and causing complications for millions of Americans already out of work. The U.S. Department of Labor Office of the Inspector General estimates at least $63 billion has been paid out improperly through fraud or errors nationwide, with a ‘significant’ portion of that attributed to fraud. That amount is roughly 10% of the total amount paid under coronavirus pandemic-related unemployment programs since March.
This perfect storm of fraud activity has been created by the economic fallout from the COVID-19 pandemic, the pressure on state government agencies to provide unemployment benefits, and a lack of anti-fraud infrastructure within those state government agencies.
This webinar explores the situation at hand and the paths forward for combating unemployment fraud.
Corey Marshall Director, Security Solutions Architect F5 | Rainier Amara Senior Program Manager Microsoft
Zero Trust is a powerful strategy that can help a business be more secure and productive. In today's digital world, a Zero Trust security approach is even more business-critical as companies address how to operate remotely today and in the future. Zero Trust is an architectural framework that assumes no user inside or outside a network is "trusted," and instills a variety of checks and balances that enhance security.
F5 and Microsoft have joined forces to provide a best-in-class Zero Trust approach to securely access all your applications.
In this webinar you'll learn:
- How you can empower users who are working from home or remotely to easily and more securely access applications that may be hosted anywhere
- How to protect against a wide range of threats, including malware, credential-based attacks, account takeover (ATO), and unauthorized access
- How using Microsoft Azure Active Directory in conjunction with F5's trusted application access solution, BIG-IP Access Policy Manager (APM), can boost overall security and enhance user experience
Applications drive the modern enterprise—delivering the positive digital experiences your customers expect.
Ensuring that apps can deliver these digital experiences by remaining available, performing well and running securely isn't easy. For years, F5 BIG-IP has helped customers meet these challenges but effective BIG-IP administration, insight, and automation can be difficult—particularly with a piecemeal, individualized approach to management.
Join our webinar to learn more about the benefits of a centralized, app-centric strategy for BIG-IP visibility, analytics, configuration, and management.
Despite powering some of the most popular apps on the planet, microservices – including containers and Kubernetes – are still a mystery to many. Microservices is both an approach to software architecture that builds a large, complex apps from multiple small components and the term for the small components themselves. In this “Microservices 101” webinar, you’ll get an introduction to microservices that will give you a working understanding of the technologies:
- Monolithic, microservices, and hybrid architectures
- Containers and Kubernetes
- Ingress controllers and service meshes
Matt Klym Senior Solution Engineer F5 | Jason Chiu Senior Solutions Engineer F5 | Umakant Singh Senior Solutions Engineer F5
TLS/SSL is a key technology for Internet security. While mostly beneficial, it can also be used for malicious purposes. Join F5 to learn how to uncover encrypted threats to your organization. Our Solutions Engineers will present the risks of using TLS/SSL encryption and demonstrate how they can be easily mitigated.
David Warburton, Sr. Threat Research EMEA, F5 | Jay Kelley,Principal Product Marketing Manager, F5
The 2020 Phishing and Fraud Report is out now and it's one of the most comprehensive publications released by F5 Labs. This report combines data from the F5 Security Operations Center (SOC), BrightCloud's Webroot platform, darknet threat intelligence from Vigilante, and features research and insights from the renowned F5 and Shape security research teams. Join our webinar to discover the report and the dangers from the world of phishing.
During the session we will…
- Explore what modern phishing attacks look like and how attackers are evolving and adapting
- Delve into the major findings from the report
- Learn ways that businesses and consumers can mitigate the risk of phishing and fraudulent activities
- Discover how F5 solutions help stop phishing and fraudulent activities and their threats
Ray Pompon, Director F5 Labs, Threat Research, F5 | Rick Jorolemon, Solutions Engineer, F5
Maintaining compliance was never easy or cheap but we at least know what we need to do, don't we? Well, we made our plans and chugged along and then some Big Things Happened. Now those plans aren't as useful anymore. All our staff are pajama casual now, both in terms of dress and in attention to cybersecurity. Mobile apps and remote banking tools are a must-have now. Even things that financial institutions have mostly held blameless for, like customer security failures and consumer fraud, are starting to cause compliance headaches. Oh, and everything is still being rapidly thrown into the cloud, either in part or in whole. So what do we need to do about this now?
Join this webinar to learn:
- The three greatest trends driving new compliance challenges
- Analysis of common regulatory requirements that crosslink to these challenges
- Indicators to watch for in your organization that these could become problems
- How to mitigate these risks and future-proof your compliance program
Your apps—fast, available and secure—in any cloud.
At F5, our mission is based on the fact that businesses depend on apps.
Our long-standing belief that applications are the most valuable assets of any organization in the digital age has been the foundation of our strategy to become the leader in multi-cloud application services. When you combine F5 and NGINX's expertise powering over half of the world's applications across all types of environments, with Shape's insight from mitigating 1 billion application attacks per day, you have a company that knows how to deliver and secure more applications, and more value, than any company in the industry.
This means that we are able to deliver and protect applications—revenue generating, brand-anchoring applications—from the point at which they are created through to the point where consumers interact with them. In other words, from "code to customer." This makes the combined forces of F5, NGINX, and Shape absolutely essential to every digital organization in the world, including the world's largest enterprises, service providers, financial and educational institutions, government entities, and consumer brands.
How to Improve the ROI of SSL/TLS Visibility Solutions - Featuring ForresterKevin Stewart, F5 | Reggie Lau Director and Principal Consultant and Sri Prakash Gupta Consultant Forrester Consulting[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]45 mins