Hi [[ session.user.profile.firstName ]]

Application Security with NGINX

In this webinar, we demonstrate how to implement effective security controls for your application infrastructure, without impacting release velocity or application performance.

Join Chris Witeck and Rajiv Kapoor as they showcase NGINX App Protect and the upcoming security capabilities within NGINX Controller, with specific business use cases in mind.

Join us in this webinar to learn:

- How to enforce SecOps-authorized security without disrupting the DevOps CI/CD process
- How to deploy and manage application security controls across distributed environments such as containers and microservices
- How to set, manage, and tune consistent security policies across your applications on premises and in multiple clouds
- How to gain an overview of your application security posture with centralized visibility and statistics
Recorded Jan 27 2021 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Witeck,Director of Product Management, F5 | Rajiv Kapoor Sr. Product Marketing Manager, F5
Presentation preview: Application Security with NGINX

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 2021 State of Application Strategy Report | F5 Jun 24 2021 5:00 pm UTC 43 mins
    Lori Mac Vittie, Principal Evangelist, F5 Office of the CTO | Cindy Borovick, Market and Competitive Strategy Lead, F5
    2021 State of Application Strategy Report: Digital Transformation Pushing Us To The Edge

    Improving connectivity, reducing latency, ensuring security, and leveraging data insights are driving organizations to rearchitect the global network with renewed focus on the edge. The edge—which is different for each industry and business function—enables new services and better performance by placing applications as close as possible to the sources and users of data.

    In this webinar, we dig into the results of our 2021 State of Application Strategy survey results and discuss:

    - Why IT leaders must deliver a unified security strategy to protect infrastructure, applications and the business

    - How telemetry and analytics at the edge will turn large volumes of data into business insights

    - Why standardization across multi-cloud cloud and automation are critical to meeting SLAs and overcoming skill set challenges
  • 2021 State of Application Strategy Report | F5 Jun 24 2021 5:00 pm UTC 43 mins
    Lori Mac Vittie, Principal Evangelist, F5 Office of the CTO | Cindy Borovick, Market and Competitive Strategy Lead, F5
    2021 State of Application Strategy Report: Digital Transformation Pushing Us To The Edge

    Improving connectivity, reducing latency, ensuring security, and leveraging data insights are driving organizations to rearchitect the global network with renewed focus on the edge. The edge—which is different for each industry and business function—enables new services and better performance by placing applications as close as possible to the sources and users of data.

    In this webinar, we dig into the results of our 2021 State of Application Strategy survey results and discuss:

    - Why IT leaders must deliver a unified security strategy to protect infrastructure, applications and the business

    - How telemetry and analytics at the edge will turn large volumes of data into business insights

    - Why standardization across multi-cloud cloud and automation are critical to meeting SLAs and overcoming skill set challenges
  • Part 3 of 3: When Will I Need a Service Mesh? Jun 23 2021 6:00 pm UTC 30 mins
    Jenn Gile | Alan Murphy | Philip Jong
    To make Kubernetes production grade, you need to add three components. In this session, we’ll focus on the third component: the service mesh. A service mesh provides fine-grained traffic management and security to application services within the cluster. We’ll demystify the complexity of Kubernetes networking and discuss where F5 can help when you’re ready to take the mesh leap, including: * Service mesh basics * Service mesh readiness checklist * How to choose service mesh * An overview of NGINX Service Mesh and Aspen Mesh
  • Part 2 of 3: How Do I Secure Kubernetes Without Slowing Down Apps? Jun 22 2021 6:00 pm UTC 24 mins
    Jenn Gile | Owen Garrett
    To make Kubernetes production grade, you need to add three components. In this session, we’ll focus on the second component: built-in security. While “coarse-grained” security might be sufficient outside the cluster, “fine-grained” security is required inside it. We’ll explore the ways you can enable production-grade security within Kubernetes, including: * Trends and challenges of securing Kubernetes at scale * How to simplify and secure your environment by centralizing WAF and Authentication at the pont of Ingress. * Why and where to duplicate your WAF, both within and outside of Kubernetes. * An overview of NGINX Ingress Controller and NGINX App Protect.
  • Choosing the Right WAF Deployment Model Jun 22 2021 5:00 pm UTC 62 mins
    Peter Scheffler, Sr. Solutions Architect, F5 | Joe Martin, Security Solution Architect, F5 | Gee Chow,Devops Specialist, F5
    Applications are architected in many ways, but all need protection from threats. Despite the industry’s best efforts to strengthen secure application development practices, decentralised and complex application deployments are difficult to protect.

    The good news is that there are tools to help you bolster your apps against breaches by mitigating vulnerabilities and stopping attacks: Web Application Firewalls (WAFs)

    Are you planning to refresh your current WAF solution? Are you moving your apps to modern environments? Join this webinar to help you choose the right WAF deployment model for your business – Self-managed, Cloud-delivered (SaaS), or Managed service.

    We will cover:
    • Pros and cons of different WAF deployment options
    • Advanced protections
    • Behavioural analytics
    • Proactive bot protection
    • API security
    • Integration into app dev lifecycle (CI/CD pipeline)
  • Production-Grade Kubernetes Part 1: How Should I Manage Kubernetes Traffic? Recorded: Jun 17 2021 20 mins
    Jenn Gile, F5 | Owen Garrett, F5
    To make Kubernetes production grade, you need to add three components. In this session, we’ll focus on the first component: the Ingress controller. An Ingress controller is a specialized load balancer that abstracts away the complexity of Kubernetes networking and bridges between services in a Kubernetes cluster and those outside it. We'll look at: * Use cases and requirements that should inform your selection of an Ingress controller *The features and capabilities that make an Ingress controller "production-grade' *An overview of the NGINX Ingress Controller
  • The Risks and Rewards of Expanded VPN Deployments Recorded: Jun 17 2021 37 mins
    Malcolm Heath, Sr. Threat Researcher, F5 Labs
    With the massive shift to work-from-home caused by COVID-19, many organizations rapidly deployed VPN and other remote access solutions to their workforces. These approaches present both rewards and risks to an organization’s overall security posture.

    In this webinar, we will identify four major risk areas: overall network architecture, access control, denial-of-service, and endpoints.

    Key Learning Objectives:

    - How VPNs can change an organization’s network security posture in unexpected ways
    - Insights into the importance of authentication and VPN Application Risks
    - Understand the issues with end user bandwidth and networking and the complexities of troubleshooting access issues when VPN is involved.

    Register Today
  • Site Resiliency Engineering Best Practices with F5 and Red Hat Recorded: Jun 16 2021 24 mins
    Eric Ji
    No matter how you define it, the Site Reliability Engineering (SRE) is clearly becoming more and more widespread in traditional IT teams. In this session, you will be up to speed on some SRE principles and best practices. We will explore how F5, in combination with Red Hat® OpenShift® and other ecosystem technologies, can empower SRE to deploy, scale, and secure modern applications.
  • Quickly Defend Your Critical Applications with a Simple Managed Security Service Recorded: Jun 15 2021 51 mins
    Dale Fairbrother, Silverline Product Management Engineer, F5
    Government Agencies and Higher Education will always be attractive cyberattack targets, but how can you turn the tables on the attackers and their bots without major investment in time and resources? There is a way to keep your critical apps available that is secure, as well as cost-effective and practical, to operate and maintain. In this webinar, we will show you how an attack on one state agency was quickly mitigated using a managed security service in an extremely short timeframe before it impacted multi-agency web assets.

    In this webinar, you will learn:
    - How to leverage a managed security service that delivers value while reducing waste and losses
    - How to continue providing innovative solutions while keeping your data secure and available
    - How to augment your security team with those hard-to-find experts available to you 24x7
    - How a managed solution requires minimal staffing and provides actionable reports and intel for your SOC
  • F5 Cloud DNS: Primary DNS Service Recorded: Jun 10 2021 12 mins
    Rick Salsa, F5
    F5 is excited to announce the launch of F5 Cloud DNS – Primary DNS Service. DNS specialists, network engineers, and DevOps teams now have the ability to easily and fully manage their DNS infrastructure optimized for today’s modern, cloud-native apps in just a few clicks. This service empowers you to deliver applications across hybrid and multi-cloud environments, scale instantly, and improve productivity with automation and DevOps integration.
  • Deploying NGINX Plus as an API Gateway Recorded: Jun 9 2021 32 mins
    Alessandro Fael Garcia, F5
    At the heart of modern application architectures is the HTTP API. APIs enable applications to be built rapidly, maintained easily, and scaled at will. API gateways are typically deployed as an additional layer in the application delivery environment, bringing additional complexity and points of failure. In this session, you’ll learn how to deploy NGINX—the most pervasive load balancer, reverse proxy, and web server—as an API gateway.
  • Improving BIG-IP Deployments with Visibility and Control Recorded: Jun 8 2021 23 mins
    Ronnie Dockery, F5 | Roman Jouhannet, F5
    Apps are how the modern enterprise materializes the consumer expectation of positive digital experiences. However, ensuring those apps can deliver on that promise by performing well, running securely, and remaining available is extremely difficult—especially with large portfolios of apps and services. Join this session to learn about the benefits of adopting a centralized, app-centric approach for managing, gaining visibility into, and automating your BIG-IP deployments.
  • F5 Labs 2021 App Protect Report: Lessons Learned Security Breaches and Incidents Recorded: Jun 3 2021 28 mins
    Ray Pompon, F5 | Sander Vinberg, F5
    Join this session to hear the latest insights from the F5 Labs Application Protection Research Series. We'll share insights from the past four years of data analysis on breach data, global honeypot nets, vulnerability analysis, and customer incident reports, including details on how the pandemic changed cybersecurity and what new threats emerged.
  • Automate App Services Deployments with Declarative APIs Recorded: Jun 1 2021 19 mins
    Kevin Delgadillo, F5
    Modern apps require modern deployment models that simplify and accelerate repeatable rollouts while minimizing errors. Join this breakout session to learn how F5's modern declarative APIs can enable app services deployment automation while abstracting configuration complexity away.
  • Preventing sophisticated ATO attacks in financial services Recorded: Apr 29 2021 55 mins
    Gary Newe, RVP Solutions Engineering, F5 | Anish Johnson, Sr. Product Manager, F5
    For financial services institutions, keeping gross fraud loss in check isn’t a choice—it’s a business imperative. With the proliferation of apps that have adopted anti-bot technologies, attackers are finding it difficult to identify soft targets, especially in banking. Instead of expending resources in an attempt to circumvent anti-automation technologies, fraudsters are pivoting and attacking unprotected email servers that become the steppingstone to the ultimate goal: your customer accounts.

    Join this webinar to learn:

    - The latest threats from organized crime rings related to the credential marketplace landscape.
    - Observations and evidence around how fraudsters are increasingly reverting to manual (i.e., human-driven) fraud methods, and how to stop them.
    - The latest machine learning algorithms trained by attack profile, risk surface, and historical fraud records that specifically protect banks, credit unions, and other financial institutions.
  • Combating Unemployment Fraud Recorded: Apr 28 2021 64 mins
    Michele Evermore, Dept of Labor|Michael Harrington,Dept of Labor | Shelley Zumwalt,Employment Security| Saurabh Bajaj, F5
    Across the country, fraud is overwhelming many states’ unemployment systems and causing complications for millions of Americans already out of work. The U.S. Department of Labor Office of the Inspector General estimates at least $63 billion has been paid out improperly through fraud or errors nationwide, with a ‘significant’ portion of that attributed to fraud. That amount is roughly 10% of the total amount paid under coronavirus pandemic-related unemployment programs since March.

    This perfect storm of fraud activity has been created by the economic fallout from the COVID-19 pandemic, the pressure on state government agencies to provide unemployment benefits, and a lack of anti-fraud infrastructure within those state government agencies.

    This webinar explores the situation at hand and the paths forward for combating unemployment fraud.
  • F5 and Microsoft: Together Addressing Zero Trust Strategy for Securing Apps Recorded: Apr 21 2021 62 mins
    Corey Marshall Director, Security Solutions Architect F5 | Rainier Amara Senior Program Manager Microsoft
    Zero Trust is a powerful strategy that can help a business be more secure and productive. In today's digital world, a Zero Trust security approach is even more business-critical as companies address how to operate remotely today and in the future. Zero Trust is an architectural framework that assumes no user inside or outside a network is "trusted," and instills a variety of checks and balances that enhance security.

    F5 and Microsoft have joined forces to provide a best-in-class Zero Trust approach to securely access all your applications.

    In this webinar you'll learn:

    - How you can empower users who are working from home or remotely to easily and more securely access applications that may be hosted anywhere

    - How to protect against a wide range of threats, including malware, credential-based attacks, account takeover (ATO), and unauthorized access

    - How using Microsoft Azure Active Directory in conjunction with F5's trusted application access solution, BIG-IP Access Policy Manager (APM), can boost overall security and enhance user experience

    Register Today
  • How to Enhance BIG-IP Administration with Central Management Recorded: Apr 20 2021 61 mins
    Zach Westall Product Marketing Manager F5 | Roman Jouhannet Sr. Product Management Engineer F5
    Applications drive the modern enterprise—delivering the positive digital experiences your customers expect.

    Ensuring that apps can deliver these digital experiences by remaining available, performing well and running securely isn't easy. For years, F5 BIG-IP has helped customers meet these challenges but effective BIG-IP administration, insight, and automation can be difficult—particularly with a piecemeal, individualized approach to management.

    Join our webinar to learn more about the benefits of a centralized, app-centric strategy for BIG-IP visibility, analytics, configuration, and management.
  • Fundamentals of Microservices Recorded: Apr 13 2021 59 mins
    Owen Garrett Sr. Director, Product Management, NGINX
    Despite powering some of the most popular apps on the planet, microservices – including containers and Kubernetes – are still a mystery to many. Microservices is both an approach to software architecture that builds a large, complex apps from multiple small components and the term for the small components themselves. In this “Microservices 101” webinar, you’ll get an introduction to microservices that will give you a working understanding of the technologies:

    - Monolithic, microservices, and hybrid architectures
    - Containers and Kubernetes
    - Ingress controllers and service meshes
  • Uncovering Encrypted Threats in FSI Recorded: Apr 12 2021 42 mins
    Matt Klym Senior Solution Engineer F5 | Jason Chiu Senior Solutions Engineer F5 | Umakant Singh Senior Solutions Engineer F5
    TLS/SSL is a key technology for Internet security. While mostly beneficial, it can also be used for malicious purposes. Join F5 to learn how to uncover encrypted threats to your organization. Our Solutions Engineers will present the risks of using TLS/SSL encryption and demonstrate how they can be easily mitigated.
Your apps—fast, available and secure—in any cloud.
At F5, our mission is based on the fact that businesses depend on apps.
Our long-standing belief that applications are the most valuable assets of any organization in the digital age has been the foundation of our strategy to become the leader in multi-cloud application services. When you combine F5 and NGINX's expertise powering over half of the world's applications across all types of environments, with Shape's insight from mitigating 1 billion application attacks per day, you have a company that knows how to deliver and secure more applications, and more value, than any company in the industry.
This means that we are able to deliver and protect applications—revenue generating, brand-anchoring applications—from the point at which they are created through to the point where consumers interact with them. In other words, from "code to customer." This makes the combined forces of F5, NGINX, and Shape absolutely essential to every digital organization in the world, including the world's largest enterprises, service providers, financial and educational institutions, government entities, and consumer brands.

Visit F5 at: https://www.f5.com/company

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Application Security with NGINX
  • Live at: Jan 27 2021 7:00 pm
  • Presented by: Chris Witeck,Director of Product Management, F5 | Rajiv Kapoor Sr. Product Marketing Manager, F5
  • From:
Your email has been sent.
or close