Event Date: February 22, 2017
Hosted By: F5 Networks & Carahsoft
Location: San Diego, CA
In this AFCEA Innovation Session you will learn about: CAC enabling SSH administrative resources such as routers and switches can be a challenge as PKI is not natively supported with these systems. Learn how F5 can help provide clientless multi-factor, password-less authentication to these systems quickly and efficiently. SSL is everywhere, learn how F5 solutions allow visibility into this “invisible” traffic and enable greater situational awareness.
Privileged User: topics for discussion
Securing one of the most difficult aspects of the DoD Cybersecurity Discipline Implementation Plan
CAC / PIV multi-factor auth to routers and switches (Strong Authentication)
Ephemeral authentication technique to CAC enable resources that can traditionally use only username and password
Consolidating auditing and logging of privileged user environments
SSL Visibility: topics for discussion
F5 security update: SSL trends, SSL Projected Growth in 2017, forms of attack, and how F5 can help mitigate those
Learn the differences behind SSL Offload, SSL Intercept, and SSL Break and Inspect
Performance impact with SSL and how F5 solves the problem
SSL Intercept techniques to leverage third party security vendors for deeper packet inspection
The importance of FIPS 140-2, and Hardware Security Modules (HSMs)
Best Practices for building SSL/TLS designs to mitigate web-based Application attacks
Use case Review: Break and inspect SSL enabled traffic
Register and attend to earn 1 CPE credit through (ISC)2!
Organizations are increasingly turning to OpenStack, an open-source cloud-computing platform, to build and manage large cloud deployments. OpenStack-based clouds, which feature a flexible services architecture, plug-in support of third-party solutions, and a rich support community, can increase agil...
F5 and Amazon Web Services (AWS) have partnered to help you rapidly deploy application workloads without incurring the capital expenditures of new infrastructure. AWS is both a pioneer and leader in the public cloud marketplace, providing customers with the ability to provision and deploy applicatio...
F5 makes sure your app remains available, accessible by the right people with
access to the right information, and ultimately ensures the integrity of your data
and brand. It’s our long history of understanding all aspects of the app—how it’s
constructed, how it operates, and its supporting...
According to research from the F5 Labs threat intelligence team, 80% of page loads on millions of sites sampled are encrypted. Transport Layer Security (TLS) adoption has become the norm for organizations of all sizes and in all industries due to several driving factors: the EU General Data Protecti...
As the Office of Personal Management breach1 has shown us, traditional user name and password access to administrative resources is a major security vulnerability in our networks today. Supporting this priority, the DoD Cybersecurity Discipline Implementation Plan's number one line of effort is s...
Protecting applications is a critical task for security professionals, yet many feel they’re fighting a losing battle. In F5 Labs’ first annual, comprehensive Application Protection Report, we provide a practical model for understanding the complexities of applications, explore specifically how ...
SSL is the set of cryptographic protocols that secure data in transit. Today SSL is
often the only tool standing between an eavesdropper and a target, or a thief and a
merchant. The stakes around SSL have been upleveled to the limit. Whether or not
it’s convenient to admit, it’s time for orga...
With SSL/TLS being one of the fastest growing attack vectors, organizations need an effective way to deploy deep packet inspection technology that is capable of identifying and blocking malicious traffic.Traditionally, organizations have deployed intrusion prevention system (IPS) inline so that all ...