F5 Networks and Carahsoft held a hands-on lab to learn about one of the most significant cyber-threats to date: ransomware. Experts agree that a multi-faceted and holistic strategy is the best defense. We will discuss actionable steps you can take to identify, prevent, detect, respond, and recover from a ransomware attack. We will also discuss the three primary attack vectors used to deliver ransomware and how F5 solutions can be directly mapped to each of these. While there is no silver bullet or magic wand to completely eliminate the threat, F5 is a trusted advisor that can help you significantly reduce ransomware risk.
Attendees learned how F5 can:
Reduce ransomware risk by providing policy-based, intelligent visibility to encrypted threats such as ransomware
Provide the ability for your existing tools to see threats and provide mitigation
Perform decryption off-box, allowing the security tool to focus on what it does best (mitigation) and not waste valuable resources on decryption
Reduce ransomware risk by leveraging multiple threat feeds to detect malicious URLs and IP addresses
In this User Group session, we focused the discussion on F5 SaaS where we took an in-depth look at current DoD application delivery models, discussed core application delivery services, and examined how an Enterprise Application Services Strategy can improve performance, reduce costs, and standardiz...
F5 Networks and Carahsoft hosted an online training where attendees learned the essentials of BIG-IP Local Traffic Manager (LTM) by introducing both commonly used and advanced LTM features. This course was intended to help attendees build a well-rounded skill set needed to understand and manage the ...
During this session we discussed how the F5 Automation Toolchain makes it faster and easier to deploy and configure F5 application services via declarative interfaces and introduced attendees to training to help them expand their skills.
During this session, we discussed how F5 can help you meet DoD SCCA CAP and/or VDSS requirements along with efficiencies F5 provides when serving cloud resources in a multi-tenant, multi-cloud environment.