Credentials are the keys to your networks, your applications, and increasingly the API backend of those applications. Join F5 Networks & Netsync for a hands-on lab where you will learn why preventing unauthorized access is critical to protecting your intellectual property and data.
Understanding how apps enable user access — and how apps can be compromised by attackers — can help you streamline processes and meet user expectations, while also helping prevent attacks.
In this lab you will learn the concepts of our Access Management solution and be guided through configuration steps for the following use cases:
Remote access VPN services
Web portals (Webtops) for publishing internal applications
Using different authentication protocols
Single Sign-On (SSO) functionality
Register and attend to receive 5 CPE credits through (ISC)2.
*Please note: In order to register for this event, you must log in to your Region One ESC account. If you do not have a Region One ESC account already set up, you will be required to create a New User account.
BIG-IP® Access Policy
Manager® (APM) is a flexible, high-performance access and security solution
that provides unified global access to your applications and network. By
converging and consolidating remote access, LAN access, and wireless
connections within a single management interface and p...
F5® BIG-IP® Global Traffic
Manager™ (GTM) distributes DNS and user application requests based on business
policies, data center and network conditions, user location, and application
performance. BIG-IP GTM delivers F5’s high-performance DNS Services with
visibility, reporting, and analysi...
F5® BIG-IP® Local Traffic
Manager™ (LTM) helps you deliver your applications to your users, in a
reliable, secure, and optimized way. You get the extensibility and flexibility
of application services with the programmability you need to manage your
physical, virtual, and cloud infrastructure...
A “web application firewall (WAF)” is an application firewall for HTTP applications. It applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection.