Hi [[ session.user.profile.firstName ]]

Choosing the Right WAF Deployment Model

Applications are architected in many ways, but all need protection from threats. Despite the industry’s best efforts to strengthen secure application development practices, decentralised and complex application deployments are difficult to protect.

The good news is that there are tools to help you bolster your apps against breaches by mitigating vulnerabilities and stopping attacks: Web Application Firewalls (WAFs)

Are you planning to refresh your current WAF solution? Are you moving your apps to modern environments? Join this webinar to help you choose the right WAF deployment model for your business – Self-managed, Cloud-delivered (SaaS), or Managed service. We will cover:

-Pros and cons of different WAF deployment options
-Advanced protections
-Behavioural analytics
-Proactive bot protection
-API security
-Integration into app dev lifecycle (CI/CD pipeline)

By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
Recorded Mar 12 2021 69 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Patrick Zoller, Solutions Architect and Matthieu Dierick, Solutions Architect
Presentation preview: Choosing the Right WAF Deployment Model

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Defeating Application Fraud in a Multi-Cloud World Jun 1 2021 9:00 am UTC 42 mins
    Joel Moses Office of the CTO, F5 and Shuman Ghosemajumder, Global Head of AI, F5
    In a digital transformation world, your applications ARE your business. That’s where you interact with your customers, where you deliver value, and where your experiences differentiate your business. The problem is, the bad guys know that too. That’s why we are seeing an escalating war on web and mobile apps across every vertical in every market.

    F5 and Shape have joined forces to defend EVERY app from attack, with a comprehensive application security portfolio, powered by a proven AI/ML engine, to slash fraud and abuse, prevents reputational damage, and eliminate business disruptions.

    Watch this informative webinar on the future of application security to learn about:

    - Where are cybercriminals headed next in their attacks on applications
    How to slash fraud losses, chargebacks, stolen loyalty points, and unauthorized fund transfers
    - How to prevent reputational damage and disruptions to critical online services
    - How your team can reduce appsec complexity and improve application performance
    - How to support real-world multi-cloud environments
  • Choosing the Right WAF Deployment Model May 28 2021 1:00 pm UTC 70 mins
    Patrick Zoller, Solutions Architect and Matthieu Dierick, Solutions Architect
    Applications are architected in many ways, but all need protection from threats. Despite the industry’s best efforts to strengthen secure application development practices, decentralised and complex application deployments are difficult to protect.

    The good news is that there are tools to help you bolster your apps against breaches by mitigating vulnerabilities and stopping attacks: Web Application Firewalls (WAFs)

    Are you planning to refresh your current WAF solution? Are you moving your apps to modern environments? Join this webinar to help you choose the right WAF deployment model for your business – Self-managed, Cloud-delivered (SaaS), or Managed service. We will cover:

    -Pros and cons of different WAF deployment options
    -Advanced protections
    -Behavioural analytics
    -Proactive bot protection
    -API security
    -Integration into app dev lifecycle (CI/CD pipeline)

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Balancing App Innovation and Cybersecurity in Financial Services May 27 2021 9:00 am UTC 58 mins
    Keiron Shepherd, Principal Solutions Engineer and John Allan, Senior Solutions Engineer
    Attackers are becoming increasingly sophisticated in banking and financial services. Bad actors are now exploiting new vulnerabilities associated with innovative apps aimed to improve customer convenience. Indeed, only 43% of consumers believe companies are doing enough to protect their personal information. Attend this webinar and discover how financial services institutions can balance customer convenience with evolving cybersecurity threats.
    You’ll learn:

    - A best-fit approach for balancing app innovation with cybersecurity risks
    - Analysis around available app innovation models in financial services
    - The steps needed to implement an evolved enterprise app methodology
  • How to Integrate Application Security in Your DevOps Environment Recorded: Apr 30 2021 67 mins
    David Warburton, Senior Threat Research Evangelist EMEA, F5 Networks
    Application security has two challenges: Keeping pace with the evolution and sophistication of attacks and keeping pace with the speed of DevOps. It is therefore essential that security is embedded into the entire software development lifecycle, with strong and consistent security controls applied no matter how or where the app is deployed.

    In this webinar, you’ll learn how to:

    • Defend web and mobile apps against a range of application attacks such as man-in-the-browser, denial of service, credential stuffing, and many more
    • Identify and stop malicious bots that help attackers automate their attacks
    • Help integrate security into application development CI/CD pipelines

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
  • Breaking the Cycle of Online Fraud Recorded: Apr 30 2021 60 mins
    Mike Plante, VP Product Marketing Shape Security, F5
    Enterprises find that despite spending billions annually on tools to detect online fraud, direct fraud losses continue to climb. Juniper Research estimates that online fraud losses in aggregate are projected to exceed $48 billion per year by 2023.

    Current fraud tools require extensive configuration, generate uncertain risk scores, require fraud teams to develop their own rules to defeat fraud applying a lot of friction to legitimate users, hurting revenue.

    In this informative webinar, you’ll learn:

    - The major sources of online fraud, including bad bots and malicious humans
    - Some of the shortcomings of today’s approaches to online fraud detection
    - Provocative metrics to help you understand online fraud and its impact on business outcomes
    - A totally new approach to preventing online fraud using AI

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
  • OWASP Top 10: The Most Critical Risks Facing Web Applications Recorded: Apr 29 2021 66 mins
    David Warburton, Senior Threat Research Evangelist EMEA, F5 Networks
    Hindsight is 20/20. That holds true for the OWASP Top 10, the threat awareness report that details the most critical security risks to web applications each year. Join us in exploring the real-world impact of the OWASP Top 10 and why the guidance is relevant in maintaining a foundational security posture in an era of digital transformation. We’ll dive into real attacks that have recently exploited OWASP Top 10 vulnerabilities.

    In this webinar you'll learn:

    • How the explosion of open source technology and cloud-based architectures has made the threat surface so challenging to protect against
    • Why OWASP Top 10 still matters and how to use it effectively to stay ahead of the curve
    • What could change with the 2020 OWASP Top 10

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
  • Multi-layer App Security in Kubernetes for DevSecOps Recorded: Apr 28 2021 69 mins
    Philippe Cloup and Mark Boddington
    Here is the webinar summary:
    Modern applications are complex, consisting of multiple software elements that are developed and upgraded separately. Studies from Cloud Native Computing Foundation and others show that containers and container orchestration platforms are now the “new normal” for application development and scaling.

    In this session, we will focus on security services that can be deployed and scaled in orchestration platforms like Kubernetes.

    You will learn how you can:
    - Protect your applications against app-layer attacks
    - Easily deploy and operate app protection with an ingress controller inside your Kubernetes cluster
    - Evolve and scale add-on services, protecting your applications at the pace of your traffic
    - Provide additional services like DDoS protection to not only secure your applications, but also your clusters

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
  • Introducing the Edge 2.0 Architecture Recorded: Apr 28 2021 65 mins
    Nico Cartron and Bart Salaets
    Delivering rich digital experiences to your clients requires a combination of multiple networks, clouds, CDNs, and edges that are manually stitched together. This creates a lot of operational complexity as each platform has a unique set of tools and services.

    In addition, having your applications distributed over a multitude of different platforms exposes new ways for attackers to exploit vulnerabilities. Current edge solutions do not provide the level of functionality or defense required by today’s digital enterprises.

    The market is ready for a shift – the shift to Edge 2.0.

    Join us for this session to learn how new platforms will allow you to build the edge architecture of the future.

    We will cover the following key aspects:

    Security-first: Security must be a fundamental aspect of an edge platform, not just an add-on
    App-driven: The needs of the apps must define the edge, rather than the apps fitting the constraints of the edge
    Unlimited scalability: The edge must be software-defined and able to expand outside the boundaries of the edge provider, including public clouds and private data centers.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
  • Choosing the Right WAF Deployment Model Recorded: Mar 12 2021 69 mins
    Patrick Zoller, Solutions Architect and Matthieu Dierick, Solutions Architect
    Applications are architected in many ways, but all need protection from threats. Despite the industry’s best efforts to strengthen secure application development practices, decentralised and complex application deployments are difficult to protect.

    The good news is that there are tools to help you bolster your apps against breaches by mitigating vulnerabilities and stopping attacks: Web Application Firewalls (WAFs)

    Are you planning to refresh your current WAF solution? Are you moving your apps to modern environments? Join this webinar to help you choose the right WAF deployment model for your business – Self-managed, Cloud-delivered (SaaS), or Managed service. We will cover:

    -Pros and cons of different WAF deployment options
    -Advanced protections
    -Behavioural analytics
    -Proactive bot protection
    -API security
    -Integration into app dev lifecycle (CI/CD pipeline)

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Defeating Application Fraud in a Multi-Cloud World Recorded: Mar 1 2021 41 mins
    Joel Moses Office of the CTO, F5 and Shuman Ghosemajumder, Global Head of AI, F5
    In a digital transformation world, your applications ARE your business. That’s where you interact with your customers, where you deliver value, and where your experiences differentiate your business. The problem is, the bad guys know that too. That’s why we are seeing an escalating war on web and mobile apps across every vertical in every market.

    F5 and Shape have joined forces to defend EVERY app from attack, with a comprehensive application security portfolio, powered by a proven AI/ML engine, to slash fraud and abuse, prevents reputational damage, and eliminate business disruptions.

    Watch this informative webinar on the future of application security to learn about:

    - Where are cybercriminals headed next in their attacks on applications
    How to slash fraud losses, chargebacks, stolen loyalty points, and unauthorized fund transfers
    - How to prevent reputational damage and disruptions to critical online services
    - How your team can reduce appsec complexity and improve application performance
    - How to support real-world multi-cloud environments

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Balancing App Innovation and Cybersecurity in Financial Services Recorded: Mar 1 2021 57 mins
    Keiron Shepherd, Principal Solutions Engineer and John Allan, Senior Solutions Engineer
    Attackers are becoming increasingly sophisticated in banking and financial services. Bad actors are now exploiting new vulnerabilities associated with innovative apps aimed to improve customer convenience. Indeed, only 43% of consumers believe companies are doing enough to protect their personal information. Attend this webinar and discover how financial services institutions can balance customer convenience with evolving cybersecurity threats.
    You’ll learn:

    - A best-fit approach for balancing app innovation with cybersecurity risks
    - Analysis around available app innovation models in financial services
    - The steps needed to implement an evolved enterprise app methodology
  • Credential Stuffing and the Future of Account Takeovers Recorded: Feb 26 2021 63 mins
    Jarrod Overson, Director Product Development
    Cyberattacks have evolved since the advent of online transacting almost 25 years ago, with attackers continually escalating and refining their techniques to protect their illicit revenue streams. Today, attackers and fraudsters can call upon a sophisticated suite of tools, including human-powered click farms, social engineering, and malware – all designed to defeat traditional defences.

    In this session, you will:

    - Understand how application attacks have evolved over the past 10 years and get insight into where attacks are going
    - Discover how sophisticated cybercriminals imitate humans and circumvent traditional defences such as WAFs, CAPTCHAs, and browser fingerprinting
    - Learn how organisations can protect their customers and brand without compromising user experience or collecting personal data

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Breaking the Cycle of Online Fraud Recorded: Feb 26 2021 59 mins
    Mike Plante, VP Product Marketing Shape Security, F5
    Enterprises find that despite spending billions annually on tools to detect online fraud, direct fraud losses continue to climb. Juniper Research estimates that online fraud losses in aggregate are projected to exceed $48 billion per year by 2023.

    Current fraud tools require extensive configuration, generate uncertain risk scores, require fraud teams to develop their own rules to defeat fraud applying a lot of friction to legitimate users, hurting revenue.

    In this informative webinar, you’ll learn:

    - The major sources of online fraud, including bad bots and malicious humans
    - Some of the shortcomings of today’s approaches to online fraud detection
    - Provocative metrics to help you understand online fraud and its impact on business outcomes
    - A totally new approach to preventing online fraud using AI

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • How to Integrate Application Security in Your DevOps Environment Recorded: Feb 1 2021 66 mins
    David Warburton, Senior Threat Research Evangelist EMEA, F5 Networks
    Application security has two challenges: Keeping pace with the evolution and sophistication of attacks and keeping pace with the speed of DevOps. It is therefore essential that security is embedded into the entire software development lifecycle, with strong and consistent security controls applied no matter how or where the app is deployed.

    In this webinar, you’ll learn how to:

    • Defend web and mobile apps against a range of application attacks such as man-in-the-browser, denial of service, credential stuffing, and many more
    • Identify and stop malicious bots that help attackers automate their attacks
    • Help integrate security into application development CI/CD pipelines

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • TLS Telemetry and the Growing Risk of Encryption Recorded: Feb 1 2021 67 mins
    David Warburton (Senior Threat Research Evangelist), Keiron Shepherd (Principal Solutions Engineer)
    In this webinar, we’ll present the results of the global HTTPS survey by F5 Labs and uncover how malware is increasingly using encrypted protocols to hide its activities. We’ll offer advice and best practices for configuring TLS and related protocols. We’ll also show how you can manage the complexity of encryption via a risk-based approach that adapts to privacy and security requirements.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Managing and Securing Your Application Traffic in Kubernetes Recorded: Jan 29 2021 61 mins
    Philippe Cloup, Senior Solutions Architect
    With organisations moving ahead with their digital transformation strategies, application teams are embracing agile development methodologies and DevOps tools. These modern applications are often deployed in container platforms such as Kubernetes, Red Hat OpenShift, or public cloud offerings like Azure Kubernetes Service, Google Kubernetes Engine, or Amazon Elastic Kubernetes Service.
    In order to make the applications accessible to the outside world in a secure manner, you need to integrate the configuration of your traffic management and application security policies in the Kubernetes framework.

    By attending this session, you will understand...

    - The main Kubernetes and OpenShift concepts to control traffic management and extended capabilities applied to application security.

    - How F5 solutions like BIG-IP Container Ingress Services and NGINX Ingress Controller fit in modern architectures.

    - The configuration steps to successfully manage and secure your applications.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Principles for Deploying a Secure Cloud Architecture Recorded: Jan 29 2021 62 mins
    Stephen Archer, Senior Specialist Systems Engineer
    In the shift to the cloud, enterprises are struggling to balance rapid business innovation with the integration of legacy systems into new cloud-based applications. The good news is that successful enterprise cloud adoption models do exist, that make it possible for teams to work together in a multi-cloud world to deliver apps quickly and securely. We call this Secure Cloud Architecture.

    Attend this webinar to learn about:

    - Architecture design principles that support business outcomes at scale
    - How development and IT roles need to evolve to support the business
    - The importance of reusable infrastructure and security services

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • 2020 Phishing and Fraud Report: An Interview with David Warburton Recorded: Dec 16 2020 7 mins
    David Warburton (Senior Threat Research Evangelist, F5) and Buu Lam (Senior Solutions Engineer, F5)
    Phishing attacks soared 220% during the height of COVID-19 and cybercriminal opportunism was off the charts. But that’s only part of the story.

    For the first time, our research focuses on how fraudsters are building, staging, and hiding their phishing sites, as well as the tactics they use to remain hidden.

    In this interview we'll be covering the key important findings and phishing incidents from the new 2020 Phishing and Fraud report by author David Warburton.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Automating Application Delivery for the Cloud with F5 and HashiCorp Recorded: Dec 3 2020 68 mins
    John Boero Channel Solution Engineer, EMEA, HashiCorp
    The rate at which new applications are being deployed is continuing to increase, with organisations often employing ten or more application services to power them. This drives the need for organisational visibility and enhanced collaboration among network, security, ops teams, and developers to build and roll out applications securely and at speed. In this webinar, we discuss digital transformation and how F5 and HashiCorp are working together to unlock the full potential of the cloud.

    We will walk through:
    - Transitioning to a multi-cloud data center
    - Modern application needs
    - Value of cloud-agnostic application services



    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Automate App Deployments with CI/CD Pipeline Integration Recorded: Nov 4 2020 28 mins
    Rodrigo Albuquerque and Connor Beechinor
    While application deployment cycles continue to speed up due to automated CI/CD pipelines, many network and security policies are still manual, ticket-driven processes. This can lead to corporate policies and controls being bypassed in favour of releasing code quickly. Attend this webinar to learn how you can provision a consistent set of application services, using automation tools already in your workflow.

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
YOUR APPS — FAST, AVAILABLE, AND SECURE — IN ANY CLOUD.
F5 provides the broadest set of services and security for enterprise-grade apps, whether on-premises or across any multi-cloud environment.

F5 Networks EMEA hosts a new webinar every month around app services and security topics, so do stay tuned to this channel to get the latest information!

To learn more about F5, visit f5.com or follow @f5networksEMEA on Twitter.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Choosing the Right WAF Deployment Model
  • Live at: Mar 12 2021 11:00 am
  • Presented by: Patrick Zoller, Solutions Architect and Matthieu Dierick, Solutions Architect
  • From:
Your email has been sent.
or close