Hi [[ session.user.profile.firstName ]]

Przenośne Zabezpieczenie Wielochmurowe

Podczas realizacji wielochmurowej strategii ochrona aplikacji staje się skomplikowana. Aby spełniała swoje zadanie, potrzebujesz narzędzi zapewniających bezpieczeństwo, integralność i dostępność, których oczekują klienci. Weź udział w tym webinarium, aby dowiedzieć się, jak:

• Stworzyć przenośną, proaktywną strategię, by chronić aplikacje w wielu chmurach
• Bronić się przed rzeczywistymi zagrożeniami biznesowymi, takimi jak blokada usług, oszustwa i kradzież własności intelektualnej
• Wyprzedzać konkurencję, wykorzystując korzyści skali

Oglądając to webinarium wyrażasz zgodę na przetwarzanie Twoich danych osobowych przez F5 zgodnie z polityką firmy (https://f5.com/about-us/policies/privacy-policy). Wyrażasz również zgodę na otrzymywanie informacji od F5 na temat produktów i rozwiązań firmy z możliwością wycofania zgody w dowolnym momencie.
Recorded Apr 16 2019 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Grzegorz Kornacki - Senior Systems Engineer, F5 Networks
Presentation preview: Przenośne Zabezpieczenie Wielochmurowe

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • OWASP Top 10: Sensitive Data Exposure Sep 12 2019 1:00 pm UTC 10 mins
    John Wagnon - Senior Solution Developer - DevCentral, F5 Networks
    The OWASP Top 10 is a list of the most common security risks on the Internet today. Sensitive Data Exposure comes in at the #3 spot in the latest edition of the OWASP Top 10. In this video, our security specialist discusses this security risk and outlines some mitigation steps to make sure your web application doesn't expose any sensitive data.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • OWASP Top 10: Broken Authentication Sep 10 2019 8:00 am UTC 10 mins
    John Wagnon - Senior Solution Developer - DevCentral, F5 Networks
    The OWASP Top 10 is a list of the most common security risks on the Internet today. Broken Authentication comes in at the #2 spot in the latest edition of the OWASP Top 10. In this video, our security specialist discusses broken authentication and outlines some mitigation steps to make sure your web application doesn't give access to the wrong users.
  • Bot Management with F5's Advanced WAF Sep 5 2019 1:00 pm UTC 12 mins
    Peter Silva - Senior Solutions Marketing Manager - Security, F5 Networks
    Automated attacks are a huge threat to organizations. Half of internet traffic are bots and 30% of those are sending malicious payloads. Learn how F5's Adv. WAF helps protect your applications from automated attacks, optimizes your business intelligence and improves performance, availability, and infrastructure costs.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • How to Uncover Attacks Hiding in Encryption Sep 3 2019 1:00 pm UTC 62 mins
    David Warburton - Senior Threat Research Evangelist EMEA, F5 Networks
    With close to 90% of the Internet encrypted and 68% of malware hiding in SSL/TLS web traffic, you may never see the threats lurking in your network. Many of the security inspection tools available today either fail to decrypt or they introduce latency and complexity, reducing security and scalability. Attend this webinar and discover how to:

    • Intelligently decrypt SSL/TLS traffic and orchestrate your security inspection tools
    • Protect SaaS applications, such as Office 365, from malware and other threats
    • Centralise decryption and re-encryption to increase the lifespan of your security devices

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Solving the Problem of TLS Visibility Aug 29 2019 1:00 pm UTC 11 mins
    John Wagnon - Senior Solution Developer - DevCentral, F5 Networks
    The F5 SSL Orchestrator (SSLO) provides a powerful solution to the problem of TLS encryption visibility. Most of the traffic on the Internet today is encrypted, so organizations have to figure out how to reliably inspect that encrypted traffic. Some solutions require a "daisy-chain" of security devices to inspect the traffic, but the F5 SSLO allows encryption/decryption to happen in one place. The SSLO "orchestrates" the traffic by implementing policies that direct traffic to one or more of the security devices depending on what type of traffic it is. The SSLO also solves the problem of cipher diversity by offering one set of cipher suites to external devices and another set of cipher suites to internal devices. Learn about all this and more as John outlines the details of the SSL Orchestrator!
  • SSL Visibility with SSLO Orchestrator Aug 27 2019 8:00 am UTC 8 mins
    Peter Silva - Senior Solutions Marketing Manager
    Are you equipped to decrypt? Over 80% of page loads are encrypted with SSL/TLS and attackers commonly use encryption to hide malicious payloads. If you’re not inspecting SSL/TLS traffic, you will miss attacks, and leave your organisation vulnerable. Watch the Lightboard Lesson video to learn how SSL Orchestrator provides robust decryption/encryption of SSL/TLS traffic.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Automating DevOps & SecOps Deployment with CI/CD Pipeline Integration with F5 Recorded: Aug 12 2019 12 mins
    Kevin Delgadillo, Principal Product Manager Automation & Orchestration and Payal Singh, Principal Solution Engineer
    Apps are getting released into market without important traffic management and security services attached as a result of a significant ideological mismatch between app dev teams and enterprise network and security teams.

    Most well-functioning CI/CD pipelines handle the integration and deployment of code with minimal human intervention. However, many still manage application services and policies through manual configurations of network and security policy using slow, ticket-driven processes. This can lead to decisions to bypass corporate security policy, network operations, and other controls in favour of releasing code quickly.

    In this webinar you’ll learn how to:
    • Increase CI/CD velocity by integrating application performance, corporate security, and compliance policies into the automation pipeline.
    • Provision a consistent set of services using whatever automation tools are already in your workflow

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Automate or Get Left Behind – Integrated Networking and Multi-Cloud Strategies Recorded: Aug 6 2019 69 mins
    Rango Rao - Cisco, Hitesh Patel - F5 Networks and Payal Singh - F5 Networks
    In the age of digital transformation, it seems there’s a new rule – automate to survive. By combining F5’s Automation Toolchain with Cisco Intent Based Networking, you will see how network and application services intents are both activated and validated.

    Join this webinar to learn how to:
    • DEPLOY F5’s automation technologies in conjunction with Cisco’s Intent-Based Networking Solutions delivered via the ACI App Center.
    • ELIMINATE common barriers to integrated application/deployments with Cisco ACI and F5 through a new, more native approach.
    • EXPERIENCE Cisco ACI’s application agility and data center automation in conjuncture with F5’s multi-cloud application services.
    • BENEFIT from extended APIC functionality using F5’s ACI ServiceCenter app to gain ACI to BIG-IP visibility, easy L2-3 network configuration and applying F5 application services to ACI workloads.

    Speakers:
    - Ranga Rao, Sr. Director, Head of Ecosystem, Product Management & Solutions Engineering, Data Center Networking, Cisco
    - Hitesh Patel, Director, Product Management; Automation, Orchestration & Ecosystem, F5 Networks
    - Payal Singh, Principal Solution Engineer, Business Development, F5 Networks

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Bridging the Divide: Modern App Development with F5 and NGINX Recorded: Jul 30 2019 33 mins
    John Kuhn, F5 VP of Product Management & Sidney Rabsatt, VP of Product Management
    It’s official: NGINX is now part of F5—and we couldn’t be more excited!

    The way you develop, deploy, and deliver apps is changing. Aligning empowered Dev teams, DevOps and CI/CD culture, multi-cloud strategies, API management, and container and microservices architectures can be challenging—and it adds layers of complexity to the app development pipeline.

    Watch the first webinar of our Bridging the Divide series to learn:

    What’s driving the divide between Dev and Ops
    - How F5 and NGINX address this divide with the tools and approaches that deliver speed, simplicity, security, and scale
    - How to best accelerate and optimize your app modernization journey
    - The common application delivery and API management use cases F5 and NGINX support
  • Troubleshoot Your Application Health and Performance with F5 Recorded: Jul 16 2019 18 mins
    Roman Jouhannet, Product Management Engineer and Zach Westall, Product Marketing Manager
    Troubleshooting application health and performance is challenging. Application performance problems can stem from many causes—flaws in the application code itself, network issues, application-layer attacks, spikes in bot traffic (malicious or otherwise), even incompatibility with specific browser or OS versions. This issue is only compounded with the steady rise in the adoption of multi-cloud infrastructures for application development and deployment.

    In this webinar you’ll learn how to:
    • Provide unified dashboards that offer role-specific access to the data that each team cares about
    • Gain robust analytics that reduces mean time-to-innocence and fosters proactive remediation
    • Avoid lengthy root cause investigations and troubleshooting cycles

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Addressing Multi-Cloud Application Management with F5 Recorded: Jul 11 2019 15 mins
    Robert Haynes, Principal Technical Marketing and Zach Westall, Product Marketing Manager
    To meet this demand for high-value applications developed at the speed of thought, IT pros and developers alike are making use public cloud for development and/or to deliver “cloud-native” services. This is the reason organisations often end up in a multi-cloud environment, where IT has to solve the challenges of new technologies, ensure service consistency, remain compliant, and avoid cloud lock-in.

    In this webinar you’ll learn how to:
    • Support the journey to a multi-cloud environment whilst being able to maintain the same standards
    • Deliver application availability and enforce security policies wherever applications are deployed
    • Simplify the deployment of consistent policies across clouds with F5

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • How to Achieve Portable Multi-Cloud Security Recorded: Jun 20 2019 53 mins
    Paul Dignan, Senior Systems Engineer, F5 Networks
    Protecting apps gets complicated when pursuing a multi-cloud strategy. To make it work, you need the tools that deliver the security, integrity, and availability customers expect. Attend this webinar to learn how to:

    • Build a portable, proactive strategy to safeguard applications across multiple clouds
    • Address real business risks, like denial of service, fraud, and intellectual property theft
    • Stay ahead of your competitors by reaping the rewards of economies of scale

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • An Introduction to OWASP Top Security Risk Cross-Site Scripting (XSS) Recorded: Jun 17 2019 11 mins
    John Wagnon - Senior Solution Developer - DevCentral, F5 Networks
    The OWASP Top 10 is a list of the most common security risks on the Internet today. Cross Site Scripting (XSS) comes in at the #7 spot in the latest edition of the OWASP Top 10. XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation or escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites. In this video, we discuss how Cross Site Scripting works and outline some mitigation steps to make sure your web application stays secure against this threat.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Fight the Good Fight Against the Bad Bots Recorded: Jun 14 2019 65 mins
    Keiron Shepherd, Senior Specialist Systems Engineer Security, F5 Networks
    Identifying malicious bots and safeguarding against them is a top priority for organisations developing a sustainable security strategy. Attend this webinar to learn:

    • How bots infect, propagate, and attack applications
    • What types of application attacks are commonly performed by bots
    • How you can defend against bad bots without disrupting the good ones

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • SSL Visibility with SSLO Orchestrator Recorded: Jun 11 2019 8 mins
    Peter Silva - Senior Solutions Marketing Manager
    Are you equipped to decrypt? Over 80% of page loads are encrypted with SSL/TLS and attackers commonly use encryption to hide malicious payloads. If you’re not inspecting SSL/TLS traffic, you will miss attacks, and leave your organisation vulnerable. Watch the Lightboard Lesson video to learn how SSL Orchestrator provides robust decryption/encryption of SSL/TLS traffic.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Explaining TLS 1.3 Recorded: Jun 4 2019 18 mins
    John Wagnon - Senior Solution Developer - DevCentral, F5 Networks
    The newest version of the TLS protocol was recently approved by the IETF -- version 1.3. There are several key changes in this protocol such as a requirement to use Perfect Forward Ciphers, and the introduction of a Zero Round Trip Time handshake for session resumption. In this video, we outline many of the important features of this new protocol.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • What is DDoS? Recorded: May 2 2019 9 mins
    Peter Silva - Senior Solutions Developer
    Over the last quarter, there were approximately 500 DDoS attacks around the world with some lasting as long as 300 hours. Join this Lightboard Lesson to hear Peter Silva light up some #basics about DoS and DDoS attacks.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Vereinheitlichung der Security in Multi-Cloud-Umgebungen Recorded: Apr 18 2019 49 mins
    Carsten Langerbein - Senior Systems Engineer, F5 Networks
    Bei einer Multi-Cloud-Strategie wird der Schutz von Apps kompliziert. Damit es funktioniert, benötigen Ihre Teams Tools, die Sicherheit, Integrität und Verfügbarkeit bieten, so wie es die Kunden erwarten. Nehmen Sie an diesem Webinar teil, um zu erfahren, wie Sie:

    • eine proaktive Strategie zum Schutz von Anwendungen über mehrere Clouds hinweg entwickeln können.
    • reale Geschäftsrisiken wie Denial-of-Service, Betrug und Diebstahl geistigen Eigentums bewältigen.
    • Ihren Mitbewerbern einen Schritt voraus bleiben, indem Sie Skaleneffekte zu Ihrem Vorteil nutzen.

    Durch Ihre Teilnahme an diesem Webinar werden Ihre persönlichen Daten an F5 weitergegeben und in Übereinstimmung mit den F5-Datenschutzrichtlinien behandelt (https://f5.com/about-us/policies/privacy-policy). Zudem stimmen Sie zu, dass wir Sie zukünftig auch über F5-Produkte und -Dienstleistungen informieren dürfen. Sie können dies natürlich jederzeit widerrufen.
  • Przenośne Zabezpieczenie Wielochmurowe Recorded: Apr 16 2019 57 mins
    Grzegorz Kornacki - Senior Systems Engineer, F5 Networks
    Podczas realizacji wielochmurowej strategii ochrona aplikacji staje się skomplikowana. Aby spełniała swoje zadanie, potrzebujesz narzędzi zapewniających bezpieczeństwo, integralność i dostępność, których oczekują klienci. Weź udział w tym webinarium, aby dowiedzieć się, jak:

    • Stworzyć przenośną, proaktywną strategię, by chronić aplikacje w wielu chmurach
    • Bronić się przed rzeczywistymi zagrożeniami biznesowymi, takimi jak blokada usług, oszustwa i kradzież własności intelektualnej
    • Wyprzedzać konkurencję, wykorzystując korzyści skali

    Oglądając to webinarium wyrażasz zgodę na przetwarzanie Twoich danych osobowych przez F5 zgodnie z polityką firmy (https://f5.com/about-us/policies/privacy-policy). Wyrażasz również zgodę na otrzymywanie informacji od F5 na temat produktów i rozwiązań firmy z możliwością wycofania zgody w dowolnym momencie.
  • Přenositelná ochrana webových aplikací v multi-cloud prostředí Recorded: Apr 16 2019 40 mins
    Radovan Gibala - Senior Systems Engineer, F5 Networks
    Zvažujete poskytování nebo už poskytujete webové aplikace z Cloudu nebo dokonce z několika různých Cloudů (tj. Mutli-Cloudu)? Chcete mít tyto aplikace chráněné stejným způsobem nehledě na to, odkud jsou poskytovány?

    Při uplatňování vícecloudové strategie se ochrana aplikací komplikuje. Aby to fungovalo a nemuseli jste dělat bezpečnostní kompromisy, potřebujete nástroje, které zajistí zabezpečení, integritu a dostupnost jakou zákazníci očekávají. Zúčastněte se tohoto webináře a dozvíte se, jak:

    • vytvořit přenositelnou, proaktivní strategii na ochranu aplikací umístěných v Multi-Cloudu,
    • řešit skutečná “business” bezpečnostní rizika, jako jsou útoky DoS, podvody, zneužití uživatelských identit s cílem zcizit duševní vlastnictví,
    • si udržet náskok před konkurencí díky efektivitě a výhod úspor z rozsahu.

    Sledováním tohoto webináře souhlasíte, že Vaše osobní údaje budou sdíleny s F5 a zpracovávány v souladu se Zásadami o ochraně osobních údajů společnosti F5 (https://f5.com/about-us/policies/privacy-policy). Také souhlasíte, že Vás F5 může kontaktovat ohledně produktů, služeb a budoucích akcí F5, ale s možností se kdykoli odhlásit.
YOUR APPS — FAST, AVAILABLE, AND SECURE — IN ANY CLOUD.
F5 provides the broadest set of services and security for enterprise-grade apps, whether on-premises or across any multi-cloud environment.

F5 Networks EMEA hosts a new webinar every month around app services and security topics, so do stay tuned to this channel to get the latest information!

To learn more about F5, visit f5.com or follow @f5networksEMEA on Twitter.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Przenośne Zabezpieczenie Wielochmurowe
  • Live at: Apr 16 2019 1:00 pm
  • Presented by: Grzegorz Kornacki - Senior Systems Engineer, F5 Networks
  • From:
Your email has been sent.
or close