Join F5 Networks and Carahsoft for our upcoming public sector workshop where we will host a lab on F5’s Zero Trust Architecture and discuss how it shifts many of the objects that would exist in a per-session policy to the per-request policy, thereby creating a more secure authentication and authorization scheme. The authenticity of each request is further enhanced through the use of F5’s Access Guard agent, installed on a client. This agent provides a PKI signed report of the posture assessment performed on the client in real-time, rather than the historical way plug-ins reported status.
The lab portion of this session will cover:
Deploying a simple reverse proxy
Creating my first policy
Configuring a VPN policy
Configuring an APM webtop
Real-time posture assessments
You don't want to miss out on this workshop experience - register now!
BIG-IP® Access Policy
Manager® (APM) is a flexible, high-performance access and security solution
that provides unified global access to your applications and network. By
converging and consolidating remote access, LAN access, and wireless
connections within a single management interface and p...
F5® BIG-IP® Global Traffic
Manager™ (GTM) distributes DNS and user application requests based on business
policies, data center and network conditions, user location, and application
performance. BIG-IP GTM delivers F5’s high-performance DNS Services with
visibility, reporting, and analysi...
F5® BIG-IP® Local Traffic
Manager™ (LTM) helps you deliver your applications to your users, in a
reliable, secure, and optimized way. You get the extensibility and flexibility
of application services with the programmability you need to manage your
physical, virtual, and cloud infrastructure...
A “web application firewall (WAF)” is an application firewall for HTTP applications. It applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection.