Hi [[ session.user.profile.firstName ]]

Choosing the Right Deployment Options for Your Application Security Needs

Web application attacks are the #1 source of data breaches. A Web Application Firewall (WAF) provides critical security controls to protect web apps. however, not all WAF solutions are the same. Similarly, very few organisations and their IT environments are the same, giving rise to different WAF demands and consumption models.

In short, different environments require differing security solutions. In this session we will cover the range of F5 WAF solutions and the ways in which organisations can deploy them to secure their applications.

In this webinar, you will learn:

• Will understand the appropriate use cases for the various F5 WAF solutions
• Will gain insight into the new F5 WAF solutions for modern application environments
• Will be introduced to F5’s new declarative security policy

By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
Recorded Nov 3 2020 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alfredo Vistola Sr. Global Solutions Architect – Security
Presentation preview: Choosing the Right Deployment Options for Your Application Security Needs

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Automating Application Delivery for the Cloud with F5 and HashiCorp Dec 3 2020 2:00 pm UTC 68 mins
    John Boero Channel Solution Engineer, EMEA, HashiCorp
    The rate at which new applications are being deployed is continuing to increase, with organisations often employing ten or more application services to power them. This drives the need for organisational visibility and enhanced collaboration among network, security, ops teams, and developers to build and roll out applications securely and at speed. In this webinar, we discuss digital transformation and how F5 and HashiCorp are working together to unlock the full potential of the cloud.

    We will walk through:
    - Transitioning to a multi-cloud data center
    - Modern application needs
    - Value of cloud-agnostic application services



    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • How to Integrate Application Security in Your DevOps Environment Dec 3 2020 9:00 am UTC 66 mins
    David Warburton, Senior Threat Research Evangelist EMEA, F5 Networks
    Application security has two challenges: Keeping pace with the evolution and sophistication of attacks and keeping pace with the speed of DevOps. It is therefore essential that security is embedded into the entire software development lifecycle, with strong and consistent security controls applied no matter how or where the app is deployed.

    In this webinar, you’ll learn how to:
    • Defend web and mobile apps against a range of application attacks such as man-in-the-browser, denial of service, credential stuffing, and many more
    • Identify and stop malicious bots that help attackers automate their attacks
    • Help integrate security into application development CI/CD pipelines

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • TLS Telemetry and the Growing Risk of Encryption Dec 2 2020 2:00 pm UTC 67 mins
    David Warburton (Senior Threat Research Evangelist), Keiron Shepherd (Principal Solutions Engineer)
    In this webinar, we’ll present the results of the global HTTPS survey by F5 Labs and uncover how malware is increasingly using encrypted protocols to hide its activities. We’ll offer advice and best practices for configuring TLS and related protocols. We’ll also show how you can manage the complexity of encryption via a risk-based approach that adapts to privacy and security requirements.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Principles for Deploying a Secure Cloud Architecture Recorded: Nov 26 2020 62 mins
    Stephen Archer, Senior Specialist Systems Engineer
    In the shift to the cloud, enterprises are struggling to balance rapid business innovation with the integration of legacy systems into new cloud-based applications. The good news is that successful enterprise cloud adoption models do exist, that make it possible for teams to work together in a multi-cloud world to deliver apps quickly and securely. We call this Secure Cloud Architecture.

    Attend this webinar to learn about:

    - Architecture design principles that support business outcomes at scale
    - How development and IT roles need to evolve to support the business
    - The importance of reusable infrastructure and security services

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Managing and Securing Your Application Traffic in Kubernetes Recorded: Nov 26 2020 61 mins
    Philippe Cloup, Senior Solutions Architect
    With organisations moving ahead with their digital transformation strategies, application teams are embracing agile development methodologies and DevOps tools. These modern applications are often deployed in container platforms such as Kubernetes, Red Hat OpenShift, or public cloud offerings like Azure Kubernetes Service, Google Kubernetes Engine, or Amazon Elastic Kubernetes Service.
    In order to make the applications accessible to the outside world in a secure manner, you need to integrate the configuration of your traffic management and application security policies in the Kubernetes framework.

    By attending this session, you will understand...

    - The main Kubernetes and OpenShift concepts to control traffic management and extended capabilities applied to application security.

    - How F5 solutions like BIG-IP Container Ingress Services and NGINX Ingress Controller fit in modern architectures.

    - The configuration steps to successfully manage and secure your applications.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Automate App Deployments with CI/CD Pipeline Integration Recorded: Nov 4 2020 28 mins
    Rodrigo Albuquerque and Connor Beechinor
    While application deployment cycles continue to speed up due to automated CI/CD pipelines, many network and security policies are still manual, ticket-driven processes. This can lead to corporate policies and controls being bypassed in favour of releasing code quickly. Attend this webinar to learn how you can provision a consistent set of application services, using automation tools already in your workflow.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Publishing and protecting modern applications with NGINX controller and BIG-IP Recorded: Nov 4 2020 52 mins
    Matthieu Dierick, Solution Architect
    When DevOps commit and publish a new application, they expect it to be published quickly. This represents a challenge for the NetOps and SecOps teams encumbered with traditional ADC solutions. Integrating NetOps and SecOps processes into CI/CD pipelines represents a considerable challenge for organisations.

    In this session, we will cover, step by step, how BIG-IP and NGINX controller can be deployed and configured by NetOps and SecOps, starting with using traditional methods (GUI, REST API), and concluding with a full CI/CD implementation by DevOps. During this session we will include tool sets such as Terraform, Ansible and Jenkins, and examining how these tools interwork with the latest F5 Declarative WAF.

    In this webinar you will learn:

    • Will learn how the new NGINX Controller 3.x publishes modern applications.
    • Understand how NGINX and BIG-IP solutions can be easily integrated in a CI/CD pipeline.
    • Gain insight into the F5 BIG-IP Declarative WAF.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Provisioning Your Apps with F5 Automation Toolchain Recorded: Nov 4 2020 62 mins
    Gert Wolfis, Solutions Architect
    Most organisations are currently executing on their digital transformation. Either, to gain a competitive advantage, to be able to adapt to the new customers behaviours, or because it will make the organisation better prepared to launch new products or services.

    The speed and consistency of deploying applications is essential and is only feasible when the right technologies and methods are being selected. This is where F5’s automation toolchain equips organisations with the ability to provide flexible, healthy and cloud-agnostic application services when migrating or building new services.

    In this webinar the F5 automation toolchain will be leveraged to support application migration by:
    •Deploying a new cloud environment.
    •Using automation to deploy consistent application services.
    •Deploying services to make current and new applications available for consumption.
    Using F5 application services puts organisations in control of where their application or service gets consumed, all facilitated through the use of an API.
    In this webinar you will learn:

    • Will identify which technologies are essential for driving business success.
    • Will understand how automation can be used when applications should are migrated.
    • Will be able to select the right tool for the job when it comes to drive digital transformation goals.
  • Fraud Prevention and the Delivery of a Friction Free Customer Experience Recorded: Nov 3 2020 64 mins
    Chris Fuller Solutions Engineering Manager, Shape Security
    Cybercrime is big business. Professional, organised attackers armed with a vast array of sophisticated tool kits can no longer be ignored. Using sophisticated techniques to bypass security controls, these cybercriminals seek to exploit vulnerabilities in your web and mobile applications to launch damaging and far reaching attacks.

    Attackers and fraudsters can call upon a sophisticated suite of tools, including human-powered click farms, social engineering, and malware - all designed to defeat traditional defences such as WAFs and CAPTCHAs.

    This one-hour session will dive deeper into how organisations can keep pace with this shift using Shape’s combination of signals, machine learning and managed service.

    In this webinar, you will learn:

    • Will understand how to prevent fraud by distinguishing between real and unreal traffic.
    • Identify how application abuse and fraudulent activities differ to other forms of application attacks.
    • Gain insight into how to enable a secure, frictionless customer experience.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Choosing the Right Deployment Options for Your Application Security Needs Recorded: Nov 3 2020 55 mins
    Alfredo Vistola Sr. Global Solutions Architect – Security
    Web application attacks are the #1 source of data breaches. A Web Application Firewall (WAF) provides critical security controls to protect web apps. however, not all WAF solutions are the same. Similarly, very few organisations and their IT environments are the same, giving rise to different WAF demands and consumption models.

    In short, different environments require differing security solutions. In this session we will cover the range of F5 WAF solutions and the ways in which organisations can deploy them to secure their applications.

    In this webinar, you will learn:

    • Will understand the appropriate use cases for the various F5 WAF solutions
    • Will gain insight into the new F5 WAF solutions for modern application environments
    • Will be introduced to F5’s new declarative security policy

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Mitigating Application DDoS Attacks Recorded: Nov 3 2020 66 mins
    Sven Mueller - Security Solution Architect
    Distributed Denial of Service (DDoS) attacks threaten businesses with downtime that can be damaging to their brand and reputation and even lead to financial losses. With the many IoT device-powered botnets and “for-hire” DDoS services, the threat and complexity of an attack is now greater than ever. Whether volumetric, computational or application mimicking in nature the common goal of these attacks is to make your application or network unavailable.

    Your network, DNS, and TLS are not often thought of as being a part of an application. Yet DoS or DDoS attacks against these tiers can render your networks, applications, or other supporting infrastructure inaccessible. HTTP(S) DDoS application attacks are highly sophisticated in terms of mitigation. The real challenge is to identify and successfully block attackers’ requests whilst still allowing legitimate traffic.

    In this webinar, you will learn:

    • Understand why HTTP floods are difficult to mitigate successfully
    • A principle understanding of F5's HTTP(S) DDoS layers
    • Learn how to protect your business by configuring F5's smart L7 DDos multi-layer protection


    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • F5 Beacon: Comprehensive Visibility and Analytics Recorded: Oct 23 2020 52 mins
    Adil Laari Sr. Product Manager, F5 Networks and Jonathan George, Manager of Product Marketing, F5 Networks
    The application landscape is growing rapidly both in number and complexity, and most organizations are unable to gain full visibility into the health and performance of their applications. App owners, IT leaders, and executives need a single solution for application visibility, insights, and analytics.

    Learn what’s new and how F5 Beacon empowers you to achieve full visibility, obtain insights across applications, and make fast, impactful, and better-informed decisions all in an easy to deploy SaaS platform.

    Key Takeaways:

    - Achieve full visibility, transparency, and monitoring of your application - landscape
    - Get simple, powerful, easy-to-consume Insights
    - Integrate across your ecosystem for actionable intelligence on your business

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
  • BIG-IP Access Policy Manager Best Practices Recorded: Jul 15 2020 59 mins
    Corey Marshall, Sr. Security Solutions Architect, F5 Networks; Chas Lesley, Sr. System Engineer, F5 Networks
    As COVID-19 rolls across the globe, many organizations including F5, are executing business continuity plans to keep our workforce and communities safe while also keeping our employees productive to fulfill customer and partner obligations. As we endure and adapt to our new normal, you may be asking yourself how to remain operational and secure while most of your workforce is working from home.
    F5 has been providing industry-leading secure remote access solutions to our customers for years and have developed best practices to meet the needs of a variety of customers. Whether you need to quickly scale or better source your remote access solution or accelerate your zero trust application access plans, F5 can help.

    In this webinar, you will learn about:

    • VPN Remote Access deployment best practices
    • How to deploy zero-trust application access with Identity Aware Proxy
    • Addressing security-related concerns including user device posture and multi-factor authentication (MFA)
    • Protecting Applications and Credential Security strategies

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Simplifying App Access with F5 and Microsoft Azure Active Directory Recorded: Jul 15 2020 57 mins
    Matthieu Dierick, Solution Architect EMEA, F5 Networks
    You may have already moved many of your workloads and applications to the cloud. However, like most organisations, you are likely to have apps that you have yet to move to the cloud or replace with SaaS apps. Many of these may be mission-critical, legacy applications that do not support modern authentication protocols (such as SAML or OAuth), single sign-on, or multi-factor authentication.

    By deploying Microsoft’s comprehensive cloud-based identity platform along with F5’s trusted application access solution, your organisation can save time, cost, and resources. In this webinar, you’ll learn how you can:

    • Simplify user access and improve security for all applications, regardless of location
    • Bridge the identity gap between cloud-based, SaaS, and on-premises applications
    • Allow legacy applications to work with Azure Active Directory

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Delivering Zero Trust Application Access Recorded: Jul 15 2020 59 mins
    Keiron Shepherd, Principal Specialist Systems Engineer, F5 Networks
    Application access is complex and vital. Applications can be anywhere, and accessed from everywhere. Up until recently, security followed the well-known "Trust, but verify" axiom. However, a new maxim has become the security mantra, “Never trust, always verify”. Organisations now not only have to simplify application access, but also enable zero trust. In a zero trust architecture, it’s imperative that application access is secure, regardless of where the application resides or the user is located.

    Attend our webinar and learn how you can:
    •Enable access to any applications, regardless of where they reside
    •Deliver zero trust application access through an identity-aware proxy approach
    •Simplify application access and enhance the user experience
    •Ensure zero trust validation for every application access request

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • F5 and Shape join forces to crush fraud and abuse, and defend your applications Recorded: Jul 14 2020 57 mins
    Joel Moses, Office of the CTO, F5 Networks & Shuman Ghosemajumder, Global Head of AI, F5 Networks
    In a digital transformation world, your applications ARE your business. That’s where you interact with your customers, where you deliver value, and where your experiences differentiate your business. The problem is, the bad guys know that too. That’s why we are seeing an escalating war on web and mobile apps across every vertical in every market.

    F5 and Shape have joined forces to defend EVERY app from attack, with a comprehensive application security portfolio, powered by a proven AI/ML engine, to slash fraud and abuse, prevents reputational damage, and eliminate business disruptions.

    Watch this informative webinar on the future of application security to learn about:

    • Where are cybercriminals headed next in their attacks on applications
    • How to slash fraud losses, chargebacks, stolen loyalty points, and unauthorized fund transfers
    • How to prevent reputational damage and disruptions to critical online services
    • How your team can reduce appsec complexity and improve application performance
    • How to support real-world multi-cloud environments

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • How to Integrate Application Security in Your DevOps Environment Recorded: Jul 14 2020 66 mins
    David Warburton, Senior Threat Research Evangelist EMEA, F5 Networks
    Application security has two challenges: Keeping pace with the evolution and sophistication of attacks and keeping pace with the speed of DevOps. It is therefore essential that security is embedded into the entire software development lifecycle, with strong and consistent security controls applied no matter how or where the app is deployed.

    In this webinar, you’ll learn how to:

    • Defend web and mobile apps against a range of application attacks such as man-in-the-browser, denial of service, credential stuffing, and many more
    • Identify and stop malicious bots that help attackers automate their attacks
    • Help integrate security into application development CI/CD pipelines

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • OWASP Top 10: The Most Critical Risks Facing Web Applications Recorded: Jul 14 2020 65 mins
    David Warburton, Senior Threat Research Evangelist EMEA, F5 Networks
    Hindsight is 20/20. That holds true for the OWASP Top 10, the threat awareness report that details the most critical security risks to web applications each year. Join us in exploring the real-world impact of the OWASP Top 10 and why the guidance is relevant in maintaining a foundational security posture in an era of digital transformation. We’ll dive into real attacks that have recently exploited OWASP Top 10 vulnerabilities.

    In this webinar you'll learn:

    • How the explosion of open source technology and cloud-based architectures has made the threat surface so challenging to protect against
    • Why OWASP Top 10 still matters and how to use it effectively to stay ahead of the curve
    • What could change with the 2020 OWASP Top 10

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Collaborating and Automating Across Teams to Get from Code to Customer Faster Recorded: Jun 30 2020 42 mins
    Yossi Rosenboim, Heath Parrot, Jon Calalang, Teri Patrick and Tim Wagner
    Responsibility for app development and deployment decisions—including those that impact security and compliance—have been shifting left towards developers and away from network and security professionals in the interest of speed. While the benefits are real, significant security threats, compliance requirements, and operational concerns remain.

    In our webinar, Product Evangelist Teri Patrick explores how teams are experiencing these changes. She’ll be joined by a panel of experts from F5 representing the people grappling with these challenges—Cloud architects and NetOps, SecOps, and DevOps professionals. They’ve been working with some of the biggest companies in the world, and helping solve their most significant issues.

    We recommend gathering your entire team so you can listen to this webinar together.

    We’ll cover:

    • What’s driving the changes in how organizations deliver new applications
    • How those changes impact the individual teams supporting the app delivery pipeline
    • What organizations can do to better plan and equip teams for ongoing technology evolution and faster app delivery pressures

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • The Monsters We Make: Apps Today and What Lies Beneath Recorded: Jun 18 2020 33 mins
    Joel Moses - Senior Director Product Management, F5 Networks
    The Monsters We Make: Apps today are loosely connected assemblies of small, often widely distributed parts. This means you can deliver new capabilities faster and more easily, but it also introduces risk.​ In the first episode of our new podcast series, Joel Moses from F5’s Office of the CTO talks about learning to live with (and maybe even love) the monsters we make.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
YOUR APPS — FAST, AVAILABLE, AND SECURE — IN ANY CLOUD.
F5 provides the broadest set of services and security for enterprise-grade apps, whether on-premises or across any multi-cloud environment.

F5 Networks EMEA hosts a new webinar every month around app services and security topics, so do stay tuned to this channel to get the latest information!

To learn more about F5, visit f5.com or follow @f5networksEMEA on Twitter.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Choosing the Right Deployment Options for Your Application Security Needs
  • Live at: Nov 3 2020 11:30 am
  • Presented by: Alfredo Vistola Sr. Global Solutions Architect – Security
  • From:
Your email has been sent.
or close