Event Date: October 25, 2017
Hosted By: F5 Networks, ClearShark & Carahsoft
Location: Norfolk, VA
Attendees of this TechTalk heard Jonathan Spigler, Systems Engineer, ClearShark, discuss the integration capability between F5â€™s BIG-IP appliances and Splunkâ€™s Big Data analytics software via the â€śF5 Networks â€“ Analytics Appâ€ť on Splunk.
The â€śF5 Networks â€“ Analytics Appâ€ť on Splunk gives in-depth visibility to various components of your BIG-IP infrastructure, covering modules such as Local Traffic Manager (LTM), Access Policy Manager (APM), Application Security Manager (ASM), Secure Web Gateway (SWG), BIG-IP DNS, and more.
BIG-IPÂ® Access Policy
ManagerÂ® (APM) is a flexible, high-performance access and security solution
that provides unified global access to your applications and network. By
converging and consolidating remote access, LAN access, and wireless
connections within a single management interface and p...
F5Â® BIG-IPÂ® Global Traffic
Managerâ„˘ (GTM) distributes DNS and user application requests based on business
policies, data center and network conditions, user location, and application
performance. BIG-IP GTM delivers F5â€™s high-performance DNS Services with
visibility, reporting, and analysi...
F5Â® BIG-IPÂ® Local Traffic
Managerâ„˘ (LTM) helps you deliver your applications to your users, in a
reliable, secure, and optimized way. You get the extensibility and flexibility
of application services with the programmability you need to manage your
physical, virtual, and cloud infrastructure...
Application Security Managerâ„˘ (ASM)
is a flexible web application firewall that secures web applications in
traditional, virtual, and private cloud environments. BIG-IP ASM helps secure
applications against unknown vulnerabilities and enables compliance for key
F5Â® Silverlineâ„˘ Web Application Firewall is a cloud-based service built on BIG-IPÂ® Application Security Managerâ„˘ (ASM) â€“ with 24x7x365 support from highly specialized security experts to help organizations protect web applications and data, and enable compliance with industry security standa...
A staple of organizations worldwide, Microsoft Office has long been one of the most popular business productivity software suites. Cloud-based Office 365, Microsoft's subscription-based access to its well-known applications, has been adopted by organizations of all sizes to increase user productivit...
With predictions of 30â€“50 billion Internet-connected devices by 2020, the need to provide end-to-end
encryption in a secure and scalable manner is critical for the protection of next-generation data centers
Federal IT organizations have never faced more difficult challenges: cyber attacks,
the mobile revolution, data center consolidation, cloud deployments, complex
application environments, and constantly increasing network traffic. And, at the
heart of it all, budget constraints demanding smart, af...