F5 & OPSWAT Webinar: Preventing Cyber Attacks on Web Applications

Presented by

Mark Campbell – Security Product Marketing, F5 Networks and George Prichici – Director of Product Management, OPSWAT

About this talk

In this webinar, security experts from F5 Networks and OPSWAT will share real-world examples on how cyber criminals can launch advanced attacks through web applications and how to stop them. The most critical web application security risks will be discussed, including file-borne threats on web applications and the joint F5 & OPSWAT solution that addresses these threats. The webinar will include a demo of a simulated web attack. After attending this webinar, you will be able to: - Identify the most critical web application security risks - Understand the best practices for web application security - Establish prevention for file-borne threats on web applications

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (6)
Subscribers (1469)
Enterprises today are beset by cyber attacks. Threat actors send attacks through any channel they can, and meanwhile, the cost of compromise is only going up. To solve the challenges faced by modern enterprises and to shut off major attack vectors, we offer two product platforms: MetaDefender for threat prevention and MetaAccess for cloud access control and endpoint compliance. Our guiding principles: Trust No File. Trust No Device. Why MetaDefender? Enterprises are investing more resources than ever in cyber security – and yet there are more and larger breaches every year. Thousands of threat prevention solutions are on the market, but most of them share one crucial flaw: they are based on detection, but detection is never 100% perfect. That's why our advanced threat prevention platform, MetaDefender, is not only based on detection. MetaDefender uses OPSWAT's unique data sanitization (Content Disarm and Reconstruction) to remove threats from files altogether by reconstructing the files and, in the process, stripping out potentially malicious active content and scripts. MetaDefender complements data sanitization with multi-scanning and vulnerability assessment. Why MetaAccess? The move by enterprises to cloud computing, SaaS applications, and bring your own device (BYOD) environments over the last decade has eliminated the traditional network perimeter, making most network access control (NAC) solutions obsolete. To meet the challenges of modern cloud-based environments and provide administrators with an access control solution for the cloud, we built MetaAccess. MetaAccess keeps SaaS applications and cloud data safe and secure. It allows access based on device health and compliance to help administrators block risky devices from connecting to sensitive cloud data and SaaS applications.