Event Date: February 12, 2020
Hosted By: F5 Networks & Carahsoft
Location: Oakland Park, FL
Join F5 Networks and Carahsoft for a hands-on lab to learn about one of the most significant cyber-threats to date: ransomware. Experts agree that a multi-faceted and holistic strategy is the best defense. We will discuss actionable steps you can take to identify, prevent, detect, respond, and recover from a ransomware attack. We will also discuss the three primary attack vectors used to deliver ransomware and how F5 solutions can be directly mapped to each of these. While there is no silver bullet or magic wand to completely eliminate the threat, F5 is a trusted advisor that can help you significantly reduce ransomware risk.
In this lab you will learn how F5 can:
Reduce ransomware risk by providing policy-based, intelligent visibility to encrypted threats such as ransomware
Provide the ability for your existing tools to see threats and provide mitigation
Perform decryption off-box, allowing the security tool to focus on what it does best (mitigation) and not waste valuable resources on decryption
Reduce ransomware risk by leveraging multiple threat feeds to detect malicious URLs and IP addresses
*Please note that in order to participate in the hands-on lab, you must bring a laptop with unrestricted Internet access.
According to research from the F5 Labs threat intelligence team, 80% of page loads on millions of sites sampled are encrypted. Transport Layer Security (TLS) adoption has become the norm for organizations of all sizes and in all industries due to several driving factors: the EU General Data Protecti...
As the Office of Personal Management breach1 has shown us, traditional user name and password access to administrative resources is a major security vulnerability in our networks today. Supporting this priority, the DoD Cybersecurity Discipline Implementation Plan's number one line of effort is s...
Protecting applications is a critical task for security professionals, yet many feel they’re fighting a losing battle. In F5 Labs’ first annual, comprehensive Application Protection Report, we provide a practical model for understanding the complexities of applications, explore specifically how ...
SSL is the set of cryptographic protocols that secure data in transit. Today SSL is
often the only tool standing between an eavesdropper and a target, or a thief and a
merchant. The stakes around SSL have been upleveled to the limit. Whether or not
it’s convenient to admit, it’s time for orga...
With SSL/TLS being one of the fastest growing attack vectors, organizations need an effective way to deploy deep packet inspection technology that is capable of identifying and blocking malicious traffic.Traditionally, organizations have deployed intrusion prevention system (IPS) inline so that all ...
The U.S. government wants to transform its IT organization
to streamline operations and smooth the transition to the
data center of the future. To this end, it is moving an
increasing number of applications to the cloud; minimizing
duplicated IT efforts; and improving the dialogue between
This paper discusses the DDoS threat facing schools today, how F5 Networks has addressed this threat for 2 large K-12 school districts, and the various F5 Silverline DDoS solution options to address this threat for your educational institution. For more information, please contact your F5 partner.