Event Date: February 12, 2020
Hosted By: F5 Networks & Carahsoft
Location: Oakland Park, FL
Join F5 Networks and Carahsoft for a hands-on lab to learn about one of the most significant cyber-threats to date: ransomware. Experts agree that a multi-faceted and holistic strategy is the best defense. We will discuss actionable steps you can take to identify, prevent, detect, respond, and recover from a ransomware attack. We will also discuss the three primary attack vectors used to deliver ransomware and how F5 solutions can be directly mapped to each of these. While there is no silver bullet or magic wand to completely eliminate the threat, F5 is a trusted advisor that can help you significantly reduce ransomware risk.
In this lab you will learn how F5 can:
Reduce ransomware risk by providing policy-based, intelligent visibility to encrypted threats such as ransomware
Provide the ability for your existing tools to see threats and provide mitigation
Perform decryption off-box, allowing the security tool to focus on what it does best (mitigation) and not waste valuable resources on decryption
Reduce ransomware risk by leveraging multiple threat feeds to detect malicious URLs and IP addresses
*Please note that in order to participate in the hands-on lab, you must bring a laptop with unrestricted Internet access.
BIG-IP® Access Policy
Manager® (APM) is a flexible, high-performance access and security solution
that provides unified global access to your applications and network. By
converging and consolidating remote access, LAN access, and wireless
connections within a single management interface and p...
F5® BIG-IP® Global Traffic
Manager™ (GTM) distributes DNS and user application requests based on business
policies, data center and network conditions, user location, and application
performance. BIG-IP GTM delivers F5’s high-performance DNS Services with
visibility, reporting, and analysi...
F5® BIG-IP® Local Traffic
Manager™ (LTM) helps you deliver your applications to your users, in a
reliable, secure, and optimized way. You get the extensibility and flexibility
of application services with the programmability you need to manage your
physical, virtual, and cloud infrastructure...
A “web application firewall (WAF)” is an application firewall for HTTP applications. It applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection.