Agility 2020 breakout sessions deliver a deep dive into the latest technologies, architectures, and trends that are shaping the market now. Choose your own path—from app security and automation to DevOps practices and AI—in technical sessions for all experience levels.
This lab is a basic introduction to F5’s BIG-IP Access Policy Manager (APM). Lab attendees will be guided through the components of Access Policy Manager configurations. Attendees will construct simple access policies and then extend those policies with various access controls. During the lab, attendees will be introduced to navigation through the APM GUI, Visual Policy Editor, troubleshooting tips and access/session log as they perform the various lab tasks.
In this BIG-IP Access Policy Manager (APM) lab, students will be guided through the fundamental building blocks and intermediate concepts leveraged in Access. Attendees will review “per session” and “per request” concepts, use agents within the Visual Policy Editor, deploy general authentication and authorization frameworks, review extended troubleshooting, and begin to delve into additional deployment use cases.
Security is becoming more challenging as organizations shift to a remote workforce and applications reside in multiple locations beyond the enterprise data center. This has caused organizations to look for new and innovative ways to solve the complex problem of real-time authentication and authorization controls.
F5’s zero trust architecture uses the Identity-Aware Proxy (IAP) to create real-time contextual access decisions regardless of endpoint location. Contextual access can come from a multitude of sources including identity providers, client posture, resource posture, or third-party integration tools.
Whether it’s standard federation or expanded integrations with IDaaS solutions, the need to securely authenticate/authorize users and systems is ever present. In this lab, students will explore F5's SAML, OAuth, and OIDC configurations and integrations from locally deployed scenarios to integrations with third-party IDaaS solutions.
With the rise in awareness around insider threats and the explosion of malware, organizations must control access to sensitive data and privileged resources. Oftentimes, they solve this problem with MFA, but MFA isn’t always the ideal solution.
F5’s ephemeral authentication takes privileged user access (PUA) to the next level by inserting itself into the authentication flow between the user and the resource. This allows users to securely authenticate BIG-IP in the manner that best fits their organization’s needs, while still maintaining tight security at the resource level without the need for password rotation.
Request-by-request security is a foundational element when considering modern application delivery and security. Beyond single-session authentication security, the need and ability to control access based on dynamic changes to the user, client, resource posture, or external telemetry is critical and factors into Zero Trust architectures. Lab attendees will explore F5's per-request policies and apply their functionality to control secure access to applications.
F5 BIG-IP Advanced Firewall Manager (AFM) is a high-performance, stateful, full-proxy network security solution designed to guard data centers against incoming threats that enter the network on the most widely deployed protocols. This lab will walk you through the setup and configuration of BIG-IP AFM and its various options.
BIG-IP Advanced Firewall Manager (AFM)’s unique app-centric design enables greater effectiveness in guarding against targeted network-level attacks. It tracks the state of network sessions, maintains deep application awareness, and uniquely mitigates attacks based on more granular details than traditional firewalls. This lab will walk you through the setup of BIG-IP AFM to protect applications at multiple layers of the OSI stack, hence providing advanced application security control. This, in effect, allows BIG-IP AFM to be multiple firewalls within a single platform.
BIG-IP Advanced Firewall Manager (AFM) is a high-performance, stateful, full-proxy network security solution designed to guard data centers against incoming threats that enter the network on the most widely deployed protocols. This lab will walk you through the new Intrusion Prevention System (IPS) features in 15.1.X, which is called Protocol Inspection.
BIG-IP Advanced Firewall Manager (AFM) provides next-generation cloud and on-premises distributed denial-of-service (DDoS) defenses to ensure real-time protections against volumetric DDoS threats; dynamic network and applications attacks; and threats hiding within encrypted traffic. This lab will help you identify and mitigate various DDoS attacks in real time as a SOC analyst would.
As the volume of data continues to grow at a rapid pace, more companies are deploying Secure Socket Layer (SSL) and Transport Layer Security (TLS) solutions to encrypt data in transit.
This is a great win for security overall to help prevent data breaches. Unfortunately, cyber criminals are using these encrypted channels to propagate malware and exfiltrate data knowing they can bypass traditional security inspection solutions that don't have visibility of the encrypted traffic.
Attend this follow me-style lab to learn how the F5 SSL Orchestrator provides you with visibility across your entire network, with policy-based traffic steering to intelligently manage encrypted traffic flows.
As organizational requirements change, so too does the need to update security polices and add additional features to existing SSL Orchestrator deployments. This lab will show you how easy maintenance can be within the SSL Orchestrator dashboard.
Learn how to build a WAF policy from nothing and how to layer on security to protect the application from known attacks – the negative security model.
Interest in WAF, a working knowledge of F5 Advanced WAF is helpful, but not needed
Take your policies to the next level. Use traffic learning to phase in a more restrictive positive security posture. In addition, build more advanced bot defense and L7 DoS protection profiles.
Soft requirement of WAF 141
Discuss how to layer on additional security features and further enhance WAF policies using learning of Parameters and URLS.
Soft requirement of WAF 241 or a working knowledge of WAF policy and learning
Discuss and practice how to integrate WAF into the pipeline.
Familiarity with CI/CD and BIG-IP ASM, recommended to have some experience with AS3.
The OWASP Top 10 is the de facto list of the top 10 most prevalent web application attacks. A challenge for many security practitioners is taking such a list of high-level attacks and turning those into a real, actionable app protection strategy. In this lab, we’ll demonstrate how to quickly protect against the OWASP Top 10 by leveraging solutions across the F5 technology portfolio, primarily, BIG-IP Advanced WAF, in addition to NGINX WAF and F5 Rules for AWS WAF.
This lab focuses on how to use NGINX+ and NGINX Controller along with F5 BIG-IP to manage APIs in your application. Familiarity with UNIX and basic concepts around microservices and web application structure is advised but not mandatory.
Scaling HTTPS today means an ever-increasing number of TLS certificates—machine identities—are in use across your application infrastructure. A painful side effect for many is application outages from expired certificates. Unfortunately, trying to automate certificate issuance, installation, and renewal has traditionally required lots of manual effort or one-off scripting. F5 and Venafi make it easy to eliminate these headaches with out-of-the-box automation for the full lifecycle of TLS certificates.
Gain hands-on experience on managing the BIG-IP instances in your ACI + BIG-IP deployment by leveraging the F5 Automation Toolchain and ACI’s programmable App Center framework.
Join this lab to learn how to leverage APIs to achieve end-to-end network automation workflows and see how different personas within your organization can benefit from these features and functionalities.
Troubleshooting application traffic coming through your BIG-IP device can sometimes be difficult. In this lab, you’ll learn how to utilize tcpdump and the F5 Wireshark Plugin to gain perspective on how traffic is flowing through your BIG-IP instances and see where a performance issue might be found.
Explore F5 Application Services 3 (AS3) by using a declarative API model to create the L4-7 configuration for a BIG-IP device, including HTTP, HTTPS, and WAF configurations.
Explore F5 Declarative Onboarding (DO) by using a declarative model to initially configure a BIG-IP device with all of the required settings to get up and ready, including system settings such as licensing and provisioning, network settings such as DNS, NTP, VLANs, Self IPs, clustering settings, and more.
Explore Telemetry Streaming (TS) by declaratively aggregating, normalizing, and forwarding statistics and events from a BIG-IP device to a consumer application by POSTing a single TS JSON declaration to TS’ declarative REST API endpoint.
This advanced level lab is focused on the F5 Automation Toolchain. It has been created to introduce students to the toolchain’s holistic components and combined uses. You should have a basic understanding of BIG-IP imperative automation technologies and a desire to learn about automation and orchestration.
The objective of this lab session is to familiarize NGINX+ users and engineers with the capabilities of NGINX Controller. This lab will provide hands-on training on how to centrally manage NGINX+ instances, deploy application configurations, and visualize health and analytic data for deployed applications.
NGINX is the de facto standard for Kubernetes ingress and apps. Automating TLS, obtaining both public and private certificates (CAs), and scaling NGINX doesn’t have to be a mystery. Learn how to fully automate the binding of machine identities from enterprise and public trust anchors to NGINX-based containers within Kubernetes environments using custom resource definitions (CRDs). Get hands on with the Venafi Platform and cert-manager from JetStack, which together elevate the concept of a “certificate issuer” and “certificate” to native, first class Kubernetes resources types. Use these skills to fully automate X.509 key and certificate lifecycles for Kubernetes ingresses, egresses, proxies and workloads without coding or having to learn new APIs.
This instructor-led workshop is intended to effectively demonstrate Ansible's capabilities using self-paced exercises. In this F5 and Ansible lab, you’ll learn advanced techniques around Ansible Playbook development as it relates to automating F5 load balancers. This hands-on workshop details utilizing the F5 BIG-IP Ansible modules with Ansible Playbooks, and with Ansible Tower for automation use cases such as certificate management, WAF policy deployment, and pool/node management.
Learn to use the BIG-IP Terraform Provider to deploy BIG-IP configurations and security policies to protect your backend applications against threats. Terraform helps to create a simple, modular, and composable infrastructure in multi-cloud environments which is immutable and leads to a more robust system. This lab will help you jumpstart an infrastructure-as-code practice and get yourself familiarized with the BIG-IP Terraform Provider. Students will learn HashiCorp Configuration Language (HCL) to write TF configuration files to provision, deploy, configure, and orchestrate BIG-IP.
In this introductory level lab, you will learn the basic concepts required to interact with the BIG-IP iControl REST API. Additionally, we’ll walk through a typical Device Onboarding workflow to deploy a fully functional BIG-IP Active/Standby pair. It’s important to note that this module will focus on demonstrating an imperative approach to automation.
IAs applications are adapted to adopt cloud-native architectures, the way F5 services are designed and configured evolves. Learn how Red Hat OpenShift’s enterprise Kubernetes platform and F5 Container Ingress Service can accelerate the adoption of cloud-native practices and provide consistent security in an organization..
In this introductory level lab, you will learn how to deploy a Kubernetes and OpenShift hosted application/container on BIG-IP using F5 Container Ingress Service (CIS).
Laptop with RDP and SSH client
In this self-guided lab, you’ll work in a dedicated AWS environment to build an HA pair of F5 Advanced WAFs from an AWS CloudFormation template. Learn how to quickly create virtual servers with a single RESTful API call via the declarative F5 AS3 iControl LX extension. Next, configure the F5 Advanced WAF to retrofit an existing application with modern protocols: TLS 1.3, HTTP/2, and Content Security Policy (CSP) headers. Finally, configure logging to AWS' native logging solution, Amazon CloudWatch, with a single RESTful API call using the declarative F5 Telemetry Streaming iControl LX extension.
We'll demystify just how Terraform integrates with the F5 Automation and Orchestration Toolchain: F5 Cloud-init, Declarative Onboarding, application services, and telemetry streaming, to automate the creation of a dedicated AWS Security VPC.
F5 and Microsoft Azure Government: Meeting SCCA Requirements. In this lab, we’ll discuss the challenges of the Department of Defense’s (DoD) cloud adoption and examine exciting solutions to meeting complex requirements of a secure cloud architecture.
This is a self-guided lab that guides you through deploying the basic 1NIC lab template.
In this lab, we’ll deploy a 3NIC Google API-based failover-based template to start, and then building upon that with an overview of the F5 Cloud Failover Extension.
Investigate and explore the movement to DNS over HTTPS and TLS and create a DNS server that will respond to DOH and DOT with F5.
Learn about the new F5 SaaS-based DNS offerings including DNS slave configuration and DNS load balancing utilizing F5 Cloud Services.
Explore DNS Services and Security by configuring the Big-IP DNS modules in a lab environment.
Hidden master, Caching resolver, DNS Express, Response policy zones (RPZ), IP Intelligence Service, URL filtering, Integration with FusionLayer DDI, EDNS0
An iRule is a powerful and flexible feature within BIG-IP Local Traffic Manager (LTM) that you can use to manage your network traffic. The iRules feature not only allows you to select pools based on header data, but also allows you to direct traffic by searching on any type of content data that you define. In this lab, you’ll learn how to utilize HTTP iRules to direct, secure, and enhance your HTTP(s) traffic.
We’ll also be enabling students some hands-on time to gain experience writing and troubleshooting iRules.
F5 iRules can often “fix” things that are missing or hard to solve in the existing application stack. Of course, custom code should never take the place of a good security product, but arguably there’s no single security device that can address every vulnerability; and malware and other exploits generally move faster than software updates and patches. iRules give you the power and flexibility to fill those gaps. This lab provides just a taste of some of that power. You’ll see a handful of ways to use iRules to defend and protect against malicious activity in your enterprise.
In this lab, you’ll learn why F5 chose Node.JS and its modules to extend the capabilities of iRules. You’ll also learn how to integrate Node.JS modules with the BIG-IP data plane. You will also get an introduction to Node.JS.
Take advantage of BIG-IQ Centralized Management and AS3 for deploying F5 security solutions.
The purpose of this class is to help you prepare for Exam 101—Application Delivery Fundamentals. This exam acknowledges the skills and understanding necessary for day-to-day management of Application Delivery Networks (ADNs). This is the first exam required to become an F5 Certified! Administrator for BIG-IP (F5-CA, BIG-IP).
During this class we’ll review the 101 Exam study guide and blueprint. The exam was updated October 1, 2019 and based on TMOS v13.1. https://support.f5.com/csp/article/K29900360#101
The minimally qualified candidate has a basic understanding of IP network fundamentals, protocols, basic security concepts, and common traffic management concepts. Candidates should also be familiar with F5 technologies, application delivery networking, and traffic distribution across multiple devices, and be able to identify common problems and likely causes.
All candidates must take this exam to move forward in the program and there are not any prerequisites for this class or the 101 exams.
This is a 4-hour lab.
The purpose of this lecture and lab is to help students prepare for Exam 201—TMOS Administration. This class provides students with a foundational knowledge required to pass Exam 201. Following this lab, students can work with their F5 field counterparts to identify additional study resources to build a broader knowledge base. Hands on experience with the F5 BIG-IP platform is essential.
After passing Exam 201 (either during Agility or at an authorized testing facility at a later date), you will become an F5 Certified! Administrator for BIG-IP (F5-CA, BIG-IP).
This is a 4-hour lab.
The purpose of this training is to help you prepare to for Exam 301a LTM Specialist - Architect, Setup and Deploy. This training will include both lectures and labs to reinforce concepts and augment your own self-study curricula. A laptop is required to complete the labs.
This is an 8-hour lab.
In this session that will include one speaker from F5 Silverline, one F5 Silverline Partner (Sungard AS) and 1-2 customers, we will discuss the challenges and opportunities that multi-cloud IT presents today. The session will also cover solutions to address risks/compliance and data protection needs while enabling companies to save time and money.
There is no shortage of security vendors in the market today. But as the value of applications increases, organizations struggle to find vendors focused specifically on application security. In this session, attendees will learn about our commitment to this discipline, and about F5’s current solutions and future directions for application-layer security, application infrastructure security, trusted application access, and intelligent threat services. This session will also provide insights into how F5 can help reduce friction between DevOps, NetOps, SecOps, and AppDev in today’s CI/CD world.
Cloud allows organizations to offload many responsibilities to third-party providers, but mitigating the risk to your applications isn’t one of them. In fact, the use of cloud and other third-party resources is rapidly expanding your attack surface, while reducing visibility and control over applications and data. In this session, attendees will learn how you protect your applications hosted in the cloud.
Serverless is one of the hottest buzzwords in the industry, but it's also one of the most misunderstood. In this session, we'll talk about what "serverless" is in the context of cloud computing, what benefits for security it offers, and what the challenges are for securing this new and emerging paradigm in application building.
Effective web application protection requires security experts who understand business applications, infrastructures, and cloud workloads. The F5 Silverline Security Operations Centers (SOC) team of “unicorns” becomes an extension of your security team and eliminates the complexity of initial and ongoing management for both WAF and DDoS services. In this session, attendees will learn about real customer attacks, including modern application, BOT, API, and DDoS attacks and how F5 Silverline Managed Services protects against them.
The vast majority of today’s application traffic is encrypted. Unfortunately, attackers are exploiting this trend by embedding threats within it, knowing that organizations cannot protect themselves against what they cannot see. In this session, attendees will learn how F5 lowers risk and maximizes infrastructure investments, efficiencies, and security with dynamic, policy-based decryption, encryption, and traffic steering through multiple inspection devices.
Quantum encryption is a fast-approaching, if not currently accessible, technology requiring security experts to understand the implications it presents. We only need to look at examples of cryptanalytics milestones to see why we need to be wary. In this session, attendees will learn what quantum cryptanalytics is and what can be done today to prepare our data and our organizations.
As presented at Black Hat, F5 security experts will explain why defending against rapidly morphing DDoS attacks, such as the infamous ProtonMail attack, is nearly impossible for SOC operators using standard mitigation methods. In this session, we will discuss our research findings that show how using a combination of machine learning algorithms to not only baseline and detect anomalies but also to measure mitigation effectiveness yielded the most efficient defense. We will also discuss how you can simulate a continuously morphing attack in your own environment using an open source security tool kit.
When you’re under attack you need support you can rely on, and the F5 Security Incident Response Team (F5 SIRT) is there for you. The F5 SIRT helps you rapidly respond to the attack, while coordinating with other F5 teams to develop ready-to-deploy technical countermeasures. The response doesn’t stop when the attack does; we’ll look beyond the reported incident to reduce the overall harm to your organization, as well as understand, anticipate, and deter future threats. How can F5 SIRT can help you?
As applications become more distributed, the attack surface is increasing. Organizations often have to make tradeoffs between releasing software quickly and ensuring security compliance. The impact to an organization’s reputation if a critical application is breached can be severe. In this session, we discuss how F5 and NGINX are bringing best-of-breed technologies together to ensure that application security is woven into every part of the application infrastructure.
As with e-mail, organizations view web applications as mission critical tools, but these tools also expose the organization to a variety of file-borne risks. In this session, we will cover three types of risks to web applications and how to apply a Zero Trust model. We will focus our discussion on high-performance, deterministic methods which neutralize threats, known and unknown, in file uploads.
Apps live anywhere today and can be accessed from everywhere, anytime. As the perimeter vanishes, the risk landscape increases, threats mount and become more sophisticated. “Trust, but verify” is replaced by “Never trust, always verify.” Apps are the front door to critical, sensitive data, so you must ensure only the right users access the right apps at the right time with the right device and right configuration, from the right place, simply. In this session, learn how identity-aware proxy drives Zero Trust app access.
The Silverline SOC stops network attacks every single day. Many of these attacks are not exceptionally sophisticated or interesting, but some of these attacks are unique and very noteworthy. In this session, attendees will hear the stories of some of these interesting DDoS attacks. We’ll also cover how the SOC mitigates these attacks and how you can be prepared for similar attacks against your organization.
As service providers are preparing for the 5G transition, security continues to be top of mind. This session will cover how F5 can help you design in security at every critical point of the infrastructure—at the edge, in the data center, and everywhere in between. Additionally, many of the 5G security strategies can be directly applied to your 4G network, helping to better secure what you already have as you prepare for the next generation of services.
In this session, attendees will learn about F5’s next-generation WAF and see it in action. We'll cover how F5 delivers a single WAF across multiple, new insertion points as well as how it leverages machine learning, conviction, and deception technologies to deliver superior security with zero configuration and tuning—promising the lowest F/P rate and TCO possible, extending the time it takes to find an exploit by 50X.
The use of encryption across the internet continues to grow unabated and now accounts for over 90% of web traffic. New and evolving protocols are encrypting every remaining clear text channel and browsers are constantly pushing to improve security for its users. F5 Labs presents the results of active and passive scanning of the web and mobile apps to show how the use of encryption is used across the web and how new protocols may change how enterprise security needs to change to keep up.
As organizations progress through digital transformation efforts, business processes and technology become inexorably linked. That linkage leads to the expansion of threat surfaces to business logic through the apps and infrastructure that implement it. The ability to not just protect—but also to enhance—business through smarter security services is the future of the industry. In this session, we will explore F5’s security technology strategy and what it means for customers.
F5 Labs has spent the past three years analyzing and combining data on cyber-attacks from a variety of F5 internal sources and external partners including breach data, surveys of security pros, malware forensics, global honeypot nets, and customer incident reports. In this session, we'll dive into the top threats, broken out industry sector, region, and technological platform.
In this session, we will discuss some of the cultural challenges that can hinder the successful deployment of secure applications. We'll examine an innovative shift-left strategy that enables developers to increase their release cadence while still meeting security requirements.
Infrastructure and security face similar challenges when it comes to app deployments, such as configuring identity and access, WAF policies, or even bot detection. It's hard to scale and secure unplanned or unmanaged deployments of any kind. What if there was an app architecture that worked across all clouds? In this presentation, attendees will learn how to align and deploy BIG-IP ASM policies to standards, configure identity and access, and automatically apply bot protection in an automated fashion.
In this session, Kenny Barnt from Central Michigan University will discuss how they're using Ansible-based automation to move toward a multiple-location environment with BIG-IP DNS, supporting both IPv4 and IPv6 virtual servers, with multifactor authentication used with BIG-IP APM—all without additional resources.
The next generation of mobile networks—also known as 5G—is already here. 5G offers augmented network functions where ultra-low latency, enhanced mobile broadband, and massive IoT enable a new breed of applications. In this session, we will talk about how technologies developed by F5 can help you modernize your network and enable an efficient transition to a 5G service-based architecture and beyond.
The way we build applications today differs greatly from how they were built just a few years ago. Development tech like microservices, function-as-a-service, and injectable components have simplified some aspects of application development but has made our apps into lumbering Frankenstein's monsters in other ways. Learn how to properly map out your monster's anatomy and identify hidden, critical weaknesses in delivery, security, and operability—before they come after you with torches.
In this session, attendees will discover how F5 and NGINX Ingress are configured for traffic into the Kubernetes cluster. Explore how the "Istio-enabled" NGINX Controller provides strong Ingress capabilities yet can still talk to the backend POD's and microservices via the service mesh.
You may know that NGINX is the most popular web server on the Internet (yes, more popular than Apache!), but that is just one of several open source projects at NGINX. In this session we will take a tour of four of these open source projects, and show a reference architecture for open source application delivery—from code to customer—as well as where each NGINX project fits in.
Microservices is having a profound effect on the way applications are developed, deployed, and updated. With APIs at the heart of a microservices architecture, we explore the technical and procedural challenges, and how they put pressure on conventional API management solutions. This session will also provide an overview of NGINX Controller for API Management through the lens of microservices.
Does your journey to the cloud include containers? If so, you’re not alone. According to Cisco’s Global Cloud Index, 85% of new app workload instances are container-based; that number will reach 95% by 2021. In this session, we’ll give you a tour of F5 Container Ingress Services – an open-source container integration solution that helps developers and system teams manage Ingress routing, load balancing, and application services in container and Platform-as-a-Service (PaaS) deployments.
Wherever you are on your digital transformation—whether it’s tackling migrating from hardware to software, considering expanding to additional clouds, wrestling with an explosion of increased API traffic, or working on optimizing for containers—NGINX can help. Join us to learn how our app-centric delivery model unleashes developer productivity and accelerates innovation velocity. You’ll learn tips and tools for how to communicate the value you and NGINX can add to your dev teams, including a technology roadmap to help plan for immediate and long-term success.
Docker and Kubernetes are considered standard components when building and orchestrating applications today. Yet you’re still responsible for managing applications built with “traditional” tools. In this session we'll explore how you can meet the demands of new, microservices applications, while still maintaining the legacy, monolith ones.
So you've chosen Kubernetes to build and manage modern applications. Once you scale and hit a certain level of complexity with Kubernetes, you'll need a service mesh to monitor, control, and secure your layer 7 traffic. In this session, we will cover the three main service mesh use cases and how they allow infrastructure and engineering teams to create application value more efficiently and securely.
APIs are at the core of modern applications. Properly securing, controlling, and monitoring them is critical. But just as important is ensuring that the organization is able to get maximum benefit from their APIs as soon as they’re published. This session will cover how F5 and NGINX enable organizations to get the most out of their API ecosystem.
With the shift to virtualization and container-scaled infrastructures, the legacy radio sites will transform into application service infrastructure, utilizing security-hardened Kubernetes edge compute resources. Learn how near-prem and on-prem 5G telco cloud platforms will change the way enterprise consumes latency- and security-sensitive cloud applications.
5G is all about the edge, which demands the ability to granularly provision capacity. The only virtualization approach with the speed and flexibility to get the job done is containers. Running containers across thousands of edge site efficiently, reliably, and securely is best handled with service mesh. This session will address the fundamentals of the importance of Kubernetes and service mesh for moving to 5G and how Aspen Mesh is helping some of the world's largest service providers get there.
There’s no denying: we live in an app-driven world. For service providers, this means users expect timely, rich access to service with no interruptions, regardless of how they access the network—from wireless to Wi-Fi. In this session, we’ll share F5’s vision for an exciting new era in self-optimizing, programmable networks, as well as solutions for application-centric networking, security, analytics, and the cloud.
Digital transformation is more than a buzzword. It has a real impact on business and its relationship with technology. In this session we’ll discuss the results of our 2020 State of Application Services research, in which over 2600 global respondents told us how digital transformation is changing their organizations and the challenges they face in the resulting multi-cloud world in which they operate.
Want to learn how to deploy, manage, and orchestrate BIG-IP solutions using its built-in elements, modernizing your deployment for ease of maintenance, upgrades, and migration? This session will focus on rarely used configuration elements, synchronization parameters, and health monitoring to help you get the job done.
In this session, attendees will learn about Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently. Explore how Terraform generates an execution plan describing what it will do to reach the desired state, and then executes it to build the described infrastructure—and what that means for your business.
In this session, we’ll cover the latest innovations in the BIG-IP platform space and discuss strategies to harvest the value of your F5 footprint on-premises, while you move to the cloud. You will learn about the importance of refreshing your aging hardware, transitioning to BIG-IP VE when hardware is not suitable, and upgrading your BIG-IP software to take advantage of the latest features and functionality.
Companies of all sizes are urgently looking to evolve cloud infrastructure and capabilities to extend across public, private, and edge. In this session, we'll cover how business-led cloud transformation is driving vendor realignment and integrated solutions, while the need for comprehensive and seamless cloud migration and management to de-risk your journey continues to grow.
The application landscape is transforming—with container-based workloads, developers empowered with cloud choice, and the rise of DevOps—and IT teams are being forced to choose between minimizing enterprise risk and embracing and enabling the chaotic innovation coming out of cloud-native development teams. See what’s new in the F5 portfolio—right-sized application services for your entire application landscape.
The F5 DNS Cloud Service offers an expertly architected, globally distributed, anycast front-ended DNS architecture with built-in DDoS protection. In this session we’ll show you how you can quickly and easily subscribe to the service and migrate your DNS service to the cloud with just a few clicks. Roll out F5 DNS Cloud Service in minutes. Pay for what you use, scale on demand.
Are you using F5 and Cisco technologies in your data center? Come hear from F5 and Cisco experts about how industry leaders in networking and application delivery align our visions and technologies to achieve a single goal for our joint customers: a policy-driven data center that securely delivers your apps, anywhere they're deployed.
By combining the F5 Automation Toolchain with Cisco Intent Based Networking, the integration portfolio has never been stronger covering vertical or horizontal stacks. In this session, you’ll hear from Cisco experts starting with an overview of the latest integration portfolio followed by a deep dive on the latest F5 ACI app in addition F5 ACI CNI. This session is intended for both business and technical audiences.
Enterprises moving workloads to the cloud must consider cloud-optimized security topology that enables even the most risk-sensitive workloads to be migrated without compromising security or compliance mandates. Together, AWS and F5 have developed a reference architecture, Secure Cloud Architecture (SCA), to help customers move applications in highly regulated industries—including financial services and federal government—to the cloud. In this session, solution architects from AWS and F5 will provide information on AWS cloud-native services, the AWS shared security responsibility model, and architectural details of SCA to allow security operators to inspect and manage all data center traffic, North-South and East-West, and how customers can integrate services from strategic partners like F5 for advanced, application-layer security.
The Red Hat Ansible Automation Platform can help enterprises create, scale, and engage with their automation. This talk will cover what is encompassed in the Ansible Automation Platform including new hosted services offerings, Automation Analytics and Automation Hub. We will cover what an Ansible Collection is; how to install, use, and create one; and how to use the officially supported Ansible Collection for F5, walking through some demos and use cases.
Learn about the Red Hat OpenShift Container Platform for modern cloud application development. In this session, we will highlight how F5 Container Ingress Services, integrated with Red Hat OpenShift, provides security, scalability, and availability of containerized applications in an enterprise environment.
HashiCorp Terraform is a developer favorite for automating and orchestrating modern infrastructure builds. However, automating the deployment and configuration of TLS services with enterprise approved machine identities (X.509 certificates) to establish trust and encrypt communications channels can be challenging. Developers also use HashiCorp Vault to store secrets/X.509 certificates but automating certificate lifecycles for public or enterprise trusted certificates can be equally challenging. In this session, we’ll explore how to avoid and overcome these challenges.
Telecommunications service providers use central offices (COs) to deliver network access and services to enterprise, residential, and mobile customers. Located at the network edge, hundreds of thousands of COs connect access and aggregation networks to metro and core networks, making them a key asset in service delivery. Even so, the purpose-built, proprietary hardware most service providers rely on can limit agility and innovation, preventing them from offering the modern services users demand today. In this session, we’ll explore virtualizing your CO with network functions virtualization (NFV) and software-defined networking (SDN) technologies and how doing so can alleviate these challenges by improving agility, innovation, and customer experience while also reducing costs. The Red Hat virtual central office solution combines modern cloud and container platforms with advanced automation and management tools to form an ideal foundation for agile, innovative, and cost-effective COs.
Learn about the latest F5 campaigns to drive opportunities around our most common use cases. You will rotate between 8 15-minute interactive sessions. Attend all 8 sessions and win a prize. Additional rewards available for active participants.
Cloud, containers, and the data economy have dramatically changed application and network architectures. The resulting impact on application delivery is driving application services out of the box into every layer of the application stack. This session will explore how application services are the foundation of a modern app delivery strategy, and how they will enable organizations to accelerate their digital transformation journey toward AI-assisted operations and business.
Are you manually detecting, isolating, and addressing issues in your container environment? Do you have concerns about the security and compliance of your microservices? DevOps teams and platform owners can now get better visibility, security, and control in container environments, as well as managing microservice complexity with analytics and insights. In this session, we'll cover new tools that help you gain insight into your applications and reduce time to discovery of root cause and resolution of microservice issues using service mesh.
Applications are the driving force behind value creation in the age of digital transformation. Gaining insights into not only your application inventory, but also the health of those applications that comprise your portfolio is the cornerstone of properly managing and leveraging your application capital. In this session, learn how the F5 Beacon SaaS visibility and analytics offering can be used to maximize the value of your applications to your business and your customers.
The ability to find and address the root cause of application failure is getting more difficult as multi-cloud application deployments grow. AppDevs, DevOps, and NetOps all need deep app health visibility and simplified troubleshooting on a per-app and per-user basis, across operating environments, multiple clouds, and F5 devices—and now they can get it. In this session, we'll see how F5 BIG-IQ provides a single source of truth across teams.
When applications start running slow, who is often the first team to blame? What if there was a feedback loop between operations and development? In this session, we will discuss how DevOps practices and telemetry can create transparency and visibility between F5 administrators and their customers—reducing the meantime to innocence for F5 administrators when troubleshooting incidents.
It’s 10 p.m. Do you know where your apps are? And how they’re doing? If you answered, “no,” then don’t miss this session. NGINX offers what you need to gain end-to-end visibility across multiple app services so you can provide powerful insights and meet SLAs with customers without having to aggregate output from disparate monitoring tools. And if you already have CI/CD analytics tools you know and love, NGINX can integrate with those, too. Join us to learn more.
Are your company’s resources and mindshare being consumed by the Digital Transformation journey? In this session, we'll use real-world examples and practical methodologies to illustrate how the entire application protection experience can be streamlined to satisfy the technical audience while also delivering greater value to lines of business or application owners using common metrics and terminology.
As organizations progress through digital transformation, they can begin to take advantage of the data economy. F5 has a unique opportunity to collect a holistic view of application telemetry due to its presence at a number of insertion points in the code-to-customer data path. The analysis of this telemetry can result in business-relevant visualizations with actionable insights as well as relevant feedback to the application owner. This session presents F5's strategic vision with respect to telemetry and will cover F5 insertion points; use cases across security, visualization, and business; and provide an overview of in-flight projects at F5.
In this session, you’ll learn about visual, intuitive, low-code automation and orchestration of F5 and NGNIX tasks like VIP creation, upgrades, blue/green application swing, traffic control dashboard via integration with DDI, ITSM, certificate authority, firewall/WAF. You’ll find out how to enable DevOps and DevSecOps with integrations to Terraform, Ansible, OpenShift, and other northbound systems. Learn how to create self-service templates for cookie-cutter deployments.