Join F5 Networks and Carahsoft for a workshop where you will learn how to remove the complexity from safeguarding your applications with F5’s Essential App Protect Service - a feature-rich, checkbox-simple SaaS security for web apps deployed in any cloud. Essential App Protect shields your web-facing apps, as a service, without sacrificing speed and agility.
Within minutes of activation, your app will have out-of-the-box protection against common web exploits, malicious IPs, and coordinated attacks - no security expertise required. Tight integration with F5 Labs threat intelligence ensures that Essential App Protect utilizes real-time insights to defend your app from evolving threat vectors.
During this workshop, attendees will learn:
The current threat landscape for Government and Education, including ransomware
Why web application threats go beyond vulnerability exploits
The difference between a Next Gen Network Firewall (NGFW) and a Web Application Firewall (WAF)
Gain hands-on experience with F5’s easy-to-use SaaS WAF, Essential App Protect - 6 months free for Education!
BIG-IP® Access Policy
Manager® (APM) is a flexible, high-performance access and security solution
that provides unified global access to your applications and network. By
converging and consolidating remote access, LAN access, and wireless
connections within a single management interface and p...
F5® BIG-IP® Global Traffic
Manager™ (GTM) distributes DNS and user application requests based on business
policies, data center and network conditions, user location, and application
performance. BIG-IP GTM delivers F5’s high-performance DNS Services with
visibility, reporting, and analysi...
F5® BIG-IP® Local Traffic
Manager™ (LTM) helps you deliver your applications to your users, in a
reliable, secure, and optimized way. You get the extensibility and flexibility
of application services with the programmability you need to manage your
physical, virtual, and cloud infrastructure...
A “web application firewall (WAF)” is an application firewall for HTTP applications. It applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection.