F5 Networks and Carahsoft held a hands-on lab to learn about one of the most significant cyber-threats to date: ransomware. Experts agree that a multi-faceted and holistic strategy is the best defense. We will discuss actionable steps you can take to identify, prevent, detect, respond, and recover from a ransomware attack. We will also discuss the three primary attack vectors used to deliver ransomware and how F5 solutions can be directly mapped to each of these. While there is no silver bullet or magic wand to completely eliminate the threat, F5 is a trusted advisor that can help you significantly reduce ransomware risk.
Attendees learned how F5 can:
Reduce ransomware risk by providing policy-based, intelligent visibility to encrypted threats such as ransomware
Provide the ability for your existing tools to see threats and provide mitigation
Perform decryption off-box, allowing the security tool to focus on what it does best (mitigation) and not waste valuable resources on decryption
Reduce ransomware risk by leveraging multiple threat feeds to detect malicious URLs and IP addresses
This session focused on SSL Orchestrator where attendees gained insights into F5's ability to deliver high-performance decryption of inbound and outbound SSL/TLS traffic, and ultimately enable a security inspection that exposes malware threats and stops attacks.
During this User Group session we focused on Advanced Web Application Firewall and App Protect and discussed the latest F5 Labs threat research which indicates web application attacks are the #1 source of data breaches. F5 announced Advanced WAF, a new category of app protection that introduces uniq...
The first subject of our DoD How To Series was Access 101/201: Zero Trust: Identity Aware Proxy and covered the following topics: Real-Time Posture Assessments, Per-Request Framework, Contextual Access, and HTTP Connector.
Application Security Manager™ (ASM)
is a flexible web application firewall that secures web applications in
traditional, virtual, and private cloud environments. BIG-IP ASM helps secure
applications against unknown vulnerabilities and enables compliance for key
A staple of organizations worldwide, Microsoft Office has long been one of the most popular business productivity software suites. Cloud-based Office 365, Microsoft's subscription-based access to its well-known applications, has been adopted by organizations of all sizes to increase user productivit...
With predictions of 30–50 billion Internet-connected devices by 2020, the need to provide end-to-end
encryption in a secure and scalable manner is critical for the protection of next-generation data centers
This is the full-spectrum, director’s cut version of the Application Protection Report, untrammeled by petty concerns like brevity or toner prices. This report pulls together the various threats, data sources, and patterns in the episodes into a unified line of inquiry that began in early 2019, pi...