Event Date: February 12, 2020
Hosted By: F5 Networks & Carahsoft
Location: Oakland Park, FL
Join F5 Networks and Carahsoft for a hands-on lab to learn about one of the most significant cyber-threats to date: ransomware. Experts agree that a multi-faceted and holistic strategy is the best defense. We will discuss actionable steps you can take to identify, prevent, detect, respond, and recover from a ransomware attack. We will also discuss the three primary attack vectors used to deliver ransomware and how F5 solutions can be directly mapped to each of these. While there is no silver bullet or magic wand to completely eliminate the threat, F5 is a trusted advisor that can help you significantly reduce ransomware risk.
In this lab you will learn how F5 can:
Reduce ransomware risk by providing policy-based, intelligent visibility to encrypted threats such as ransomware
Provide the ability for your existing tools to see threats and provide mitigation
Perform decryption off-box, allowing the security tool to focus on what it does best (mitigation) and not waste valuable resources on decryption
Reduce ransomware risk by leveraging multiple threat feeds to detect malicious URLs and IP addresses
*Please note that in order to participate in the hands-on lab, you must bring a laptop with unrestricted Internet access.
Application Security Manager™ (ASM)
is a flexible web application firewall that secures web applications in
traditional, virtual, and private cloud environments. BIG-IP ASM helps secure
applications against unknown vulnerabilities and enables compliance for key
F5® Silverline™ Web Application Firewall is a cloud-based service built on BIG-IP® Application Security Manager™ (ASM) – with 24x7x365 support from highly specialized security experts to help organizations protect web applications and data, and enable compliance with industry security standa...
A staple of organizations worldwide, Microsoft Office has long been one of the most popular business productivity software suites. Cloud-based Office 365, Microsoft's subscription-based access to its well-known applications, has been adopted by organizations of all sizes to increase user productivit...
With predictions of 30–50 billion Internet-connected devices by 2020, the need to provide end-to-end
encryption in a secure and scalable manner is critical for the protection of next-generation data centers
Federal IT organizations have never faced more difficult challenges: cyber attacks,
the mobile revolution, data center consolidation, cloud deployments, complex
application environments, and constantly increasing network traffic. And, at the
heart of it all, budget constraints demanding smart, af...
Federal agencies are increasing the online services that they provide to citizens and employees to enable faster access to information, reduce operational costs, and increase transaction accuracy. Key to the success of this online delivery platform is public trust. When user data is compromised, an ...
Consumers prefer the convenience of engaging with institutions via smartphones or tablet devices. For this reason, mobile application services are essential for the future of online banking and financial services. With the increased sophistication in fraud threats and attacks, your institution’s s...
The modern world runs on applications. Your employees require apps to do their jobs, while your customers rely on them to connect with your business and advance their own. Expectations are high. All your users demand immediate, uninterrupted, and secure access to the applications they need when they...
Organizations are increasingly moving to containerized environments for developing and deploying applications. Container environments offer a system of application development in logical units for a faster time to market, to meet business demands, process automation, achieve greater agility and effi...
F5® Application Connector is an add-on to the F5 BIG-IP® platform, enabling services insertion for public cloud applications. In addition, it acts as a cloud proxy instance for securely connecting public clouds to an organization’s application service infrastructure within cloud interconnects (c...