Event Date: March 11, 2020
Hosted By: F5 Networks, Inc. & Carahsoft
Location: Honolulu, HI
Join F5 Networks and Carahsoft on March 11th for a hands-on DoD Use Case Tech Session at Hickam AFB. In this workshop, you will gain practical knowledge on real time DoD use cases like Advanced Web Application Firewall, BIG-IQ and Automation and Orchestration and more Application Delivery solutions.
Advanced Web Application Firewall (Advanced WAF) We will discuss the latest F5 Labs threat research which indicate Web application attacks are the #1 source of data breaches. Web Application Firewall (WAF) provides critical security controls to protect web apps. However, not all WAF solutions are the same. While many can help an organization protect their apps from common and known threats, most are inadequate against the myriad of attacks across the evolving risk landscape. F5 announced Advanced WAF, a new category of app protection that introduces unique capabilities to the WAF market:
The external threat surface of an application and where vulnerabilities exist
Today’s major threats to your applications and data
How to scope your app-centric security program with critical protection strategies
Managing complex security systems through F5 BIG-IQ Manager
11:00am – 12:00pm F5’s Automation Orchestration Toolchain When NetOps and SecOps teams do not (or are unable to) participate in automated application delivery processes, applications can be released without adequate security or traffic management controls. The result? Poor user experiences and increased business risk as well as significant challenges with post-release management and operability. But it doesn’t have to be this way.
Rapid provisioning of scalable services through declarative APIs or service catalogs gives the SecOps and NetOps teams the tools they need to protect the application and maintain compliance without adding friction to the software delivery lifecycle. Changing manual processes into automated ones helps NetOps and SecOps teams manage thousands of instances and apps at scale.
But how do you get started with automation? During this tech session, we’ll show how the F5 Automation Toolchain makes it faster and easier to deploy and configure F5 application services via declarative interfaces and introduce you to training to help you expand your skills.
What you'll learn:
How the F5 Automation Toolchain can help you automate configuration & deployment easily
How to use the components of the Automation Toolchain to efficiently provision, configure, and manage the services that support your apps
How to empower DevOps with declarative technology, orchestration integration, cloud templates and more
Don't miss out on this valuable information - register today!
BIG-IP® Access Policy
Manager® (APM) is a flexible, high-performance access and security solution
that provides unified global access to your applications and network. By
converging and consolidating remote access, LAN access, and wireless
connections within a single management interface and p...
F5® BIG-IP® Global Traffic
Manager™ (GTM) distributes DNS and user application requests based on business
policies, data center and network conditions, user location, and application
performance. BIG-IP GTM delivers F5’s high-performance DNS Services with
visibility, reporting, and analysi...
F5® BIG-IP® Local Traffic
Manager™ (LTM) helps you deliver your applications to your users, in a
reliable, secure, and optimized way. You get the extensibility and flexibility
of application services with the programmability you need to manage your
physical, virtual, and cloud infrastructure...
Application Security Manager™ (ASM)
is a flexible web application firewall that secures web applications in
traditional, virtual, and private cloud environments. BIG-IP ASM helps secure
applications against unknown vulnerabilities and enables compliance for key
F5® Silverline™ Web Application Firewall is a cloud-based service built on BIG-IP® Application Security Manager™ (ASM) – with 24x7x365 support from highly specialized security experts to help organizations protect web applications and data, and enable compliance with industry security standa...
A staple of organizations worldwide, Microsoft Office has long been one of the most popular business productivity software suites. Cloud-based Office 365, Microsoft's subscription-based access to its well-known applications, has been adopted by organizations of all sizes to increase user productivit...
With predictions of 30–50 billion Internet-connected devices by 2020, the need to provide end-to-end
encryption in a secure and scalable manner is critical for the protection of next-generation data centers
Federal IT organizations have never faced more difficult challenges: cyber attacks,
the mobile revolution, data center consolidation, cloud deployments, complex
application environments, and constantly increasing network traffic. And, at the
heart of it all, budget constraints demanding smart, af...