Hi [[ session.user.profile.firstName ]]

F5 Beacon: Comprehensive Visibility and Analytics

The application landscape is growing rapidly both in number and complexity, and most organizations are unable to gain full visibility into the health and performance of their applications. App owners, IT leaders, and executives need a single solution for application visibility, insights, and analytics.

Learn what’s new and how F5 Beacon empowers you to achieve full visibility, obtain insights across applications, and make fast, impactful, and better-informed decisions all in an easy to deploy SaaS platform.

Key Takeaways:

- Achieve full visibility, transparency, and monitoring of your application - landscape
- Get simple, powerful, easy-to-consume Insights
- Integrate across your ecosystem for actionable intelligence on your business

By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
Recorded Oct 23 2020 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adil Laari Sr. Product Manager, F5 Networks and Jonathan George, Manager of Product Marketing, F5 Networks
Presentation preview: F5 Beacon: Comprehensive Visibility and Analytics

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Integrate Application Security in Your DevOps Environment Recorded: Apr 30 2021 67 mins
    David Warburton, Senior Threat Research Evangelist EMEA, F5 Networks
    Application security has two challenges: Keeping pace with the evolution and sophistication of attacks and keeping pace with the speed of DevOps. It is therefore essential that security is embedded into the entire software development lifecycle, with strong and consistent security controls applied no matter how or where the app is deployed.

    In this webinar, you’ll learn how to:

    • Defend web and mobile apps against a range of application attacks such as man-in-the-browser, denial of service, credential stuffing, and many more
    • Identify and stop malicious bots that help attackers automate their attacks
    • Help integrate security into application development CI/CD pipelines

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
  • Breaking the Cycle of Online Fraud Recorded: Apr 30 2021 60 mins
    Mike Plante, VP Product Marketing Shape Security, F5
    Enterprises find that despite spending billions annually on tools to detect online fraud, direct fraud losses continue to climb. Juniper Research estimates that online fraud losses in aggregate are projected to exceed $48 billion per year by 2023.

    Current fraud tools require extensive configuration, generate uncertain risk scores, require fraud teams to develop their own rules to defeat fraud applying a lot of friction to legitimate users, hurting revenue.

    In this informative webinar, you’ll learn:

    - The major sources of online fraud, including bad bots and malicious humans
    - Some of the shortcomings of today’s approaches to online fraud detection
    - Provocative metrics to help you understand online fraud and its impact on business outcomes
    - A totally new approach to preventing online fraud using AI

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
  • OWASP Top 10: The Most Critical Risks Facing Web Applications Recorded: Apr 29 2021 66 mins
    David Warburton, Senior Threat Research Evangelist EMEA, F5 Networks
    Hindsight is 20/20. That holds true for the OWASP Top 10, the threat awareness report that details the most critical security risks to web applications each year. Join us in exploring the real-world impact of the OWASP Top 10 and why the guidance is relevant in maintaining a foundational security posture in an era of digital transformation. We’ll dive into real attacks that have recently exploited OWASP Top 10 vulnerabilities.

    In this webinar you'll learn:

    • How the explosion of open source technology and cloud-based architectures has made the threat surface so challenging to protect against
    • Why OWASP Top 10 still matters and how to use it effectively to stay ahead of the curve
    • What could change with the 2020 OWASP Top 10

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
  • Multi-layer App Security in Kubernetes for DevSecOps Recorded: Apr 28 2021 69 mins
    Philippe Cloup and Mark Boddington
    Here is the webinar summary:
    Modern applications are complex, consisting of multiple software elements that are developed and upgraded separately. Studies from Cloud Native Computing Foundation and others show that containers and container orchestration platforms are now the “new normal” for application development and scaling.

    In this session, we will focus on security services that can be deployed and scaled in orchestration platforms like Kubernetes.

    You will learn how you can:
    - Protect your applications against app-layer attacks
    - Easily deploy and operate app protection with an ingress controller inside your Kubernetes cluster
    - Evolve and scale add-on services, protecting your applications at the pace of your traffic
    - Provide additional services like DDoS protection to not only secure your applications, but also your clusters

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
  • Introducing the Edge 2.0 Architecture Recorded: Apr 28 2021 65 mins
    Nico Cartron and Bart Salaets
    Delivering rich digital experiences to your clients requires a combination of multiple networks, clouds, CDNs, and edges that are manually stitched together. This creates a lot of operational complexity as each platform has a unique set of tools and services.

    In addition, having your applications distributed over a multitude of different platforms exposes new ways for attackers to exploit vulnerabilities. Current edge solutions do not provide the level of functionality or defense required by today’s digital enterprises.

    The market is ready for a shift – the shift to Edge 2.0.

    Join us for this session to learn how new platforms will allow you to build the edge architecture of the future.

    We will cover the following key aspects:

    Security-first: Security must be a fundamental aspect of an edge platform, not just an add-on
    App-driven: The needs of the apps must define the edge, rather than the apps fitting the constraints of the edge
    Unlimited scalability: The edge must be software-defined and able to expand outside the boundaries of the edge provider, including public clouds and private data centers.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
  • Choosing the Right WAF Deployment Model Recorded: Mar 12 2021 69 mins
    Patrick Zoller, Solutions Architect and Matthieu Dierick, Solutions Architect
    Applications are architected in many ways, but all need protection from threats. Despite the industry’s best efforts to strengthen secure application development practices, decentralised and complex application deployments are difficult to protect.

    The good news is that there are tools to help you bolster your apps against breaches by mitigating vulnerabilities and stopping attacks: Web Application Firewalls (WAFs)

    Are you planning to refresh your current WAF solution? Are you moving your apps to modern environments? Join this webinar to help you choose the right WAF deployment model for your business – Self-managed, Cloud-delivered (SaaS), or Managed service. We will cover:

    -Pros and cons of different WAF deployment options
    -Advanced protections
    -Behavioural analytics
    -Proactive bot protection
    -API security
    -Integration into app dev lifecycle (CI/CD pipeline)

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Defeating Application Fraud in a Multi-Cloud World Recorded: Mar 1 2021 41 mins
    Joel Moses Office of the CTO, F5 and Shuman Ghosemajumder, Global Head of AI, F5
    In a digital transformation world, your applications ARE your business. That’s where you interact with your customers, where you deliver value, and where your experiences differentiate your business. The problem is, the bad guys know that too. That’s why we are seeing an escalating war on web and mobile apps across every vertical in every market.

    F5 and Shape have joined forces to defend EVERY app from attack, with a comprehensive application security portfolio, powered by a proven AI/ML engine, to slash fraud and abuse, prevents reputational damage, and eliminate business disruptions.

    Watch this informative webinar on the future of application security to learn about:

    - Where are cybercriminals headed next in their attacks on applications
    How to slash fraud losses, chargebacks, stolen loyalty points, and unauthorized fund transfers
    - How to prevent reputational damage and disruptions to critical online services
    - How your team can reduce appsec complexity and improve application performance
    - How to support real-world multi-cloud environments

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Balancing App Innovation and Cybersecurity in Financial Services Recorded: Mar 1 2021 57 mins
    Keiron Shepherd, Principal Solutions Engineer and John Allan, Senior Solutions Engineer
    Attackers are becoming increasingly sophisticated in banking and financial services. Bad actors are now exploiting new vulnerabilities associated with innovative apps aimed to improve customer convenience. Indeed, only 43% of consumers believe companies are doing enough to protect their personal information. Attend this webinar and discover how financial services institutions can balance customer convenience with evolving cybersecurity threats.
    You’ll learn:

    - A best-fit approach for balancing app innovation with cybersecurity risks
    - Analysis around available app innovation models in financial services
    - The steps needed to implement an evolved enterprise app methodology
  • Credential Stuffing and the Future of Account Takeovers Recorded: Feb 26 2021 63 mins
    Jarrod Overson, Director Product Development
    Cyberattacks have evolved since the advent of online transacting almost 25 years ago, with attackers continually escalating and refining their techniques to protect their illicit revenue streams. Today, attackers and fraudsters can call upon a sophisticated suite of tools, including human-powered click farms, social engineering, and malware – all designed to defeat traditional defences.

    In this session, you will:

    - Understand how application attacks have evolved over the past 10 years and get insight into where attacks are going
    - Discover how sophisticated cybercriminals imitate humans and circumvent traditional defences such as WAFs, CAPTCHAs, and browser fingerprinting
    - Learn how organisations can protect their customers and brand without compromising user experience or collecting personal data

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Breaking the Cycle of Online Fraud Recorded: Feb 26 2021 59 mins
    Mike Plante, VP Product Marketing Shape Security, F5
    Enterprises find that despite spending billions annually on tools to detect online fraud, direct fraud losses continue to climb. Juniper Research estimates that online fraud losses in aggregate are projected to exceed $48 billion per year by 2023.

    Current fraud tools require extensive configuration, generate uncertain risk scores, require fraud teams to develop their own rules to defeat fraud applying a lot of friction to legitimate users, hurting revenue.

    In this informative webinar, you’ll learn:

    - The major sources of online fraud, including bad bots and malicious humans
    - Some of the shortcomings of today’s approaches to online fraud detection
    - Provocative metrics to help you understand online fraud and its impact on business outcomes
    - A totally new approach to preventing online fraud using AI

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • How to Integrate Application Security in Your DevOps Environment Recorded: Feb 1 2021 66 mins
    David Warburton, Senior Threat Research Evangelist EMEA, F5 Networks
    Application security has two challenges: Keeping pace with the evolution and sophistication of attacks and keeping pace with the speed of DevOps. It is therefore essential that security is embedded into the entire software development lifecycle, with strong and consistent security controls applied no matter how or where the app is deployed.

    In this webinar, you’ll learn how to:

    • Defend web and mobile apps against a range of application attacks such as man-in-the-browser, denial of service, credential stuffing, and many more
    • Identify and stop malicious bots that help attackers automate their attacks
    • Help integrate security into application development CI/CD pipelines

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • TLS Telemetry and the Growing Risk of Encryption Recorded: Feb 1 2021 67 mins
    David Warburton (Senior Threat Research Evangelist), Keiron Shepherd (Principal Solutions Engineer)
    In this webinar, we’ll present the results of the global HTTPS survey by F5 Labs and uncover how malware is increasingly using encrypted protocols to hide its activities. We’ll offer advice and best practices for configuring TLS and related protocols. We’ll also show how you can manage the complexity of encryption via a risk-based approach that adapts to privacy and security requirements.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Managing and Securing Your Application Traffic in Kubernetes Recorded: Jan 29 2021 61 mins
    Philippe Cloup, Senior Solutions Architect
    With organisations moving ahead with their digital transformation strategies, application teams are embracing agile development methodologies and DevOps tools. These modern applications are often deployed in container platforms such as Kubernetes, Red Hat OpenShift, or public cloud offerings like Azure Kubernetes Service, Google Kubernetes Engine, or Amazon Elastic Kubernetes Service.
    In order to make the applications accessible to the outside world in a secure manner, you need to integrate the configuration of your traffic management and application security policies in the Kubernetes framework.

    By attending this session, you will understand...

    - The main Kubernetes and OpenShift concepts to control traffic management and extended capabilities applied to application security.

    - How F5 solutions like BIG-IP Container Ingress Services and NGINX Ingress Controller fit in modern architectures.

    - The configuration steps to successfully manage and secure your applications.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Principles for Deploying a Secure Cloud Architecture Recorded: Jan 29 2021 62 mins
    Stephen Archer, Senior Specialist Systems Engineer
    In the shift to the cloud, enterprises are struggling to balance rapid business innovation with the integration of legacy systems into new cloud-based applications. The good news is that successful enterprise cloud adoption models do exist, that make it possible for teams to work together in a multi-cloud world to deliver apps quickly and securely. We call this Secure Cloud Architecture.

    Attend this webinar to learn about:

    - Architecture design principles that support business outcomes at scale
    - How development and IT roles need to evolve to support the business
    - The importance of reusable infrastructure and security services

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • 2020 Phishing and Fraud Report: An Interview with David Warburton Recorded: Dec 16 2020 7 mins
    David Warburton (Senior Threat Research Evangelist, F5) and Buu Lam (Senior Solutions Engineer, F5)
    Phishing attacks soared 220% during the height of COVID-19 and cybercriminal opportunism was off the charts. But that’s only part of the story.

    For the first time, our research focuses on how fraudsters are building, staging, and hiding their phishing sites, as well as the tactics they use to remain hidden.

    In this interview we'll be covering the key important findings and phishing incidents from the new 2020 Phishing and Fraud report by author David Warburton.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Automating Application Delivery for the Cloud with F5 and HashiCorp Recorded: Dec 3 2020 68 mins
    John Boero Channel Solution Engineer, EMEA, HashiCorp
    The rate at which new applications are being deployed is continuing to increase, with organisations often employing ten or more application services to power them. This drives the need for organisational visibility and enhanced collaboration among network, security, ops teams, and developers to build and roll out applications securely and at speed. In this webinar, we discuss digital transformation and how F5 and HashiCorp are working together to unlock the full potential of the cloud.

    We will walk through:
    - Transitioning to a multi-cloud data center
    - Modern application needs
    - Value of cloud-agnostic application services



    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Automate App Deployments with CI/CD Pipeline Integration Recorded: Nov 4 2020 28 mins
    Rodrigo Albuquerque and Connor Beechinor
    While application deployment cycles continue to speed up due to automated CI/CD pipelines, many network and security policies are still manual, ticket-driven processes. This can lead to corporate policies and controls being bypassed in favour of releasing code quickly. Attend this webinar to learn how you can provision a consistent set of application services, using automation tools already in your workflow.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Publishing and protecting modern applications with NGINX controller and BIG-IP Recorded: Nov 4 2020 52 mins
    Matthieu Dierick, Solution Architect
    When DevOps commit and publish a new application, they expect it to be published quickly. This represents a challenge for the NetOps and SecOps teams encumbered with traditional ADC solutions. Integrating NetOps and SecOps processes into CI/CD pipelines represents a considerable challenge for organisations.

    In this session, we will cover, step by step, how BIG-IP and NGINX controller can be deployed and configured by NetOps and SecOps, starting with using traditional methods (GUI, REST API), and concluding with a full CI/CD implementation by DevOps. During this session we will include tool sets such as Terraform, Ansible and Jenkins, and examining how these tools interwork with the latest F5 Declarative WAF.

    In this webinar you will learn:

    • Will learn how the new NGINX Controller 3.x publishes modern applications.
    • Understand how NGINX and BIG-IP solutions can be easily integrated in a CI/CD pipeline.
    • Gain insight into the F5 BIG-IP Declarative WAF.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Provisioning Your Apps with F5 Automation Toolchain Recorded: Nov 4 2020 62 mins
    Gert Wolfis, Solutions Architect
    Most organisations are currently executing on their digital transformation. Either, to gain a competitive advantage, to be able to adapt to the new customers behaviours, or because it will make the organisation better prepared to launch new products or services.

    The speed and consistency of deploying applications is essential and is only feasible when the right technologies and methods are being selected. This is where F5’s automation toolchain equips organisations with the ability to provide flexible, healthy and cloud-agnostic application services when migrating or building new services.

    In this webinar the F5 automation toolchain will be leveraged to support application migration by:
    •Deploying a new cloud environment.
    •Using automation to deploy consistent application services.
    •Deploying services to make current and new applications available for consumption.
    Using F5 application services puts organisations in control of where their application or service gets consumed, all facilitated through the use of an API.
    In this webinar you will learn:

    • Will identify which technologies are essential for driving business success.
    • Will understand how automation can be used when applications should are migrated.
    • Will be able to select the right tool for the job when it comes to drive digital transformation goals.
  • Fraud Prevention and the Delivery of a Friction Free Customer Experience Recorded: Nov 3 2020 64 mins
    Chris Fuller Solutions Engineering Manager, Shape Security
    Cybercrime is big business. Professional, organised attackers armed with a vast array of sophisticated tool kits can no longer be ignored. Using sophisticated techniques to bypass security controls, these cybercriminals seek to exploit vulnerabilities in your web and mobile applications to launch damaging and far reaching attacks.

    Attackers and fraudsters can call upon a sophisticated suite of tools, including human-powered click farms, social engineering, and malware - all designed to defeat traditional defences such as WAFs and CAPTCHAs.

    This one-hour session will dive deeper into how organisations can keep pace with this shift using Shape’s combination of signals, machine learning and managed service.

    In this webinar, you will learn:

    • Will understand how to prevent fraud by distinguishing between real and unreal traffic.
    • Identify how application abuse and fraudulent activities differ to other forms of application attacks.
    • Gain insight into how to enable a secure, frictionless customer experience.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
YOUR APPS — FAST, AVAILABLE, AND SECURE — IN ANY CLOUD.
F5 provides the broadest set of services and security for enterprise-grade apps, whether on-premises or across any multi-cloud environment.

F5 Networks EMEA hosts a new webinar every month around app services and security topics, so do stay tuned to this channel to get the latest information!

To learn more about F5, visit f5.com or follow @f5networksEMEA on Twitter.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: F5 Beacon: Comprehensive Visibility and Analytics
  • Live at: Oct 23 2020 10:00 am
  • Presented by: Adil Laari Sr. Product Manager, F5 Networks and Jonathan George, Manager of Product Marketing, F5 Networks
  • From:
Your email has been sent.
or close