EVENTS

Webinars

FEATURED WEBINAR

Connect F5 and AWS to Deliver Secure Shopping Experiences

Date: Tuesday, December 13, 2022

Time: 10:00am PT | 1:00pm ET

Malicious bots wreak havoc on your shopping environment by a million cuts: Creating fake accounts, launching account takeovers, scraping sensitive data, inventory hoarding, gift card cracking, and more. You can try and stop them – and many organizations may try the DIY route – but attackers just retool and adapt their tactics. Now, the F5 Distributed Cloud Bot Defense Connector for Amazon CloudFront, AWS CDN Service can help you get ahead of the problem.

Join us for a roundtable discussion with retailer VegNonVeg, AWS, and F5. You'll learn how F5 Distributed Cloud Bot Defense and Amazon CloudFront protect VegNonVeg applications and serve their customers with secure, delightful shopping experiences.

In this webinar, you’ll learn:

·      How to determine whether you need a bot defense solution
– and why it’s important to do so

·      How AWS customers can secure their applications and
customers without adding friction

·      How to seamlessly deploy F5 Distributed Cloud Bot
Defense in front of your Amazon CloudFront CDN

Register here 


APPLICATION PERFORMANCE AND AUTOMATION WEBINARS

APPLICATION PERFORMANCE AND AUTOMATION

Real-Time Security F5 AWAF Automation with Red Hat Ansible

Join this webinar to learn how F5's Advanced Web Application Firewall (AWAF) protects and secures legacy and modern web applications from threats in real time.

APPLICATION PERFORMANCE AND AUTOMATION

2022 Application Strategy: Digital Transformation Trends

Join this webinar to hear the F5 state of application strategy survey results and discover how to successfully navigate your digital transformation journey.

APPLICATION PERFORMANCE AND AUTOMATION

Key Strategies to Address Multi-Cloud Networking Challenges

To keep pace with growing user expectations around digital experiences while honouring data privacy and residency regulations, more and more applications are being decomposed and distributed across different cloud platforms. For NetOps and DevOps practitioners, this creates a need for simplifying app-to-app networking across multiple clouds as a foundation for distributing applications.

APPLICATION PERFORMANCE AND AUTOMATION

Using Telemetry to Automatically Scale Your BIG-IP Infrastructure

Deploying applications across multiple clouds is increasing costs and operational challenges. With a rigidly deployed application infrastructure that caters to peak traffic demand, you may be wasting capacity—which leads to a higher cost of ownership. By leveraging automation and service discovery, F5 BIG-IP infrastructure and services can scale automatically based on your traffic demand. 


APPLICATION SECURITY WEBINARS

SECURITY

OWASP Automated Threats: 21 Fraud Street

Join this webinar to dive into OWASP Automated Threats to see important guidance on improving software security through this community-led open source project. Gain a better understanding of automated attacks and how F5 Bot Defense mitigates them, and we’ll get real on some widely deployed security controls (apologies in advance to any CAPTCHA fans). We wrap up with an Ask the Expert Q&A with Dan Woods, F5 Global Head of Intelligence, and former FBI Special Agent and CIA Cyber-Operations Officer.

SECURITY

The Mindset and Services for Modern App Security

F5 and Enterprise Strategy Group (ESG) unpacks recent app and API security survey results, digging into the evolving threat landscape and app security trends. Get introduced to F5's newest SaaS delivered solution, F5 Distributed Cloud Web App and API Protection (WAAP). Unifying app security is more than shedding vendors; it takes a new mindset and movement toward holistic, platform-delivered WAAP solutions that are easy to use.

SECURITY

3-Part Webinar Series: Adopting Zero-Trust Security

When it comes to protecting your online environment, the days of “trust but verify” are gone. To keep your system secure and running at its best, adopting zero trust security practices is a must. But creating a true zero trust environment can be daunting for even the most skilled security professionals. Fortunately, we’re here to make it easier.

Join us for a three-webinar series to learn about the principles, technologies, and best practices that provide a critical foundation for zero trust..

SECURITY

2-part Webinar Series: Solving Challenges of the Multi-Cloud Networking Landscape

Learn how you can simplify and automate your multi-cloud infrastructure to make it more secure, easier for your teams to manage, and reduce costs.

SECURITY

Leverage Encrypted Traffic Security and Orchestration in the Cloud

Join this webinar to learn how your organization can flexibly leverage encrypted threat protection and traffic orchestration in the cloud.

SECURITY

F5 Cybersecurity Summit

Ransomware, malware, bots, fraud, social engineering, phishing – the list of threats to a business and its day-to-day operations seems never-ending. But you don't have to go it alone – F5 is here to secure and deliver extraordinary digital experiences. Learn more about the current threat landscape, solutions, and our in-house cybersecurity research and expertise.

SECURITY

Let's speak Frankly: Evolving Your Application Protections for a Distributed Environment

Learn how to secure your distributed architecture with F5's distributed cloud security solutions.  We’ll show you the critical app security tools delivered as SaaS to secure your hybrid environments

SECURITY

Simplifying Operations: Using BIG-IQ to upgrade BIG-IP

Join this webinar to learn how to manage multiple BIG-IP platforms by upgrading with BIG-IQ through real-world best practices and examples from the F5 team.


 

FEATURED SERVICE PROVIDER WEBINARS

Service Provider

Cloud Native Edge-as-a-Service: Innovation from Core to Enterprise Edge

Edge computing is vital in driving new business models for MNOs. Learn how to architect your network from the core to the edge using cloud-native operations.

Service Provider

2021 Telecom Security: Exploring the Threat Landscape

Service providers have the daunting task of building a network that lives up to customer expectations for 5G. As networks evolve, so does the telecom security threat landscape. Learn about current, key topics in cybersecurity and how telcos can keep networks secure.

SERVICE PROVIDER

How 5G Success Starts With Your Infrastructure

Cloud-native infrastructure is foundational to a Service Provider’s 5G success. The ability to define, manage, and control 5G cloud-native infrastructure enables Service Providers to bring processing power within sub millisecond latency to the edge of the network, opening up a new world of innovation opportunities for customers.

Service Provider

5G Security: Offload Hyperscale DDoS Attacks to SmartNICs

As service providers virtualize, new volumetric DDoS threats emerge. Learn how SmartNICs with F5 AFM software offloads traffic, improving security and reducing CPU and TCO.

Service Provider

5G An Opportunity To Get Security Right

Join this webcast to review key findings from the 2019 Heavy Reading 5G Security Market Leadership study which details where leading providers are focusing their 5G security planning efforts.

 

SERVICE PROVIDER

Self-Configuring NFV Packaged Solutions-for Fast and Flexible Deployment

Virtualization can help with overprovisioning your network. Learn how F5 makes implementing NFV easier--now you can deploy new services (and terminate them) at the click of a button.

SERVICE PROVIDER

The Time Is Now to Add Cloud-Native Network Functions for Both 4G and 5G

F5 senior leaders and Heavy Reading Research Director Jim Hodges discuss the evolution to cloud-native network functions (CNFs) CNFs address multiple pain points to reduce CapEX and OpEX costs and unify cloud infrastructure to support both Telco and IT workloads. The webinar highlights two key use cases for Gi LAN consolidation for VNFs and CNFs, and 5G Core Kubernetes security.

SERVICE PROVIDER

Securing 5G Networks: Industry Research Survey Discussion

This webinar shares Heavy Reading research from network industry leaders supporting Service Providers for a grounded view of the strategies and timelines they should take to secure their 5G networks.


FEATURED BANKING AND FINANCIAL SERVICES INSTITUTE (BFSI) WEBINARS

Banking and Financial Services Institute

Open Banking Trends, Challenges & Opportunities

The U.S. banking industry is increasingly using open banking related API protocols. Learn more about the trends, challenges, and opportunities in open banking.

Banking and Financial Services Institute

It's True: Legacy Systems are Holding FinServs Back

Attend our webinar to discover how forward-thinking organizations are currently approaching the migration of legacy apps and achieving rapid innovation.

You’ll learn:

  • How to best approach migrating your legacy applications to modern infrastructure
  • Best ways to integrate new functionality, like managing and securing APIs
  • The latest security methodologies and processes
Banking and Financial Services Institute

Deploy, Secure and Scale Your Applications with Ease Using AWS and NGINX

Listen to this cyber security webinar to learn how NGINX & AWS work together to create scalable & secure web apps, ready for the rising threat of API abuse.

We cover the different ways that NGINX is designed for enterprise workloads and runs on AWS Services such as Cloud Load Balancing, EKS, and ECS, adding new layers of automation and security to your environments. 

Banking and Financial Services Institute

Avoid Costly Human Errors in Financial Services Using Ansible Automation and F5

A mounting challenge for SecOps teams is keeping up with the sheer volume and sophistication of attacks, often requiring investigation, diagnoses, and remediation of security threats.

In this session will review how automation, combined with telemetry, can aid security teams to mitigate most common layer 7 attacks enabling SecOps teams to investigate and resolve more sophisticated threats.

Banking and Financial Services Institute

Challenges from the Evolving Cybersecurity Threats in Financial Services

Join this webinar to learn the latest F5 Labs financial services cybersecurity data, including how to shrink the widening gap of security vulnerabilities.

Banking and Financial Services Institute

Using AI to Break the Cycle of Online Fraud

Juniper Research estimates that global online fraud losses are projected to be more than $48 billion per year by 2023, despite massive investments in tools and staff to mitigate the risk. Clearly, current strategies are not effective.  Fraud tools can be difficult to maintain and may insert friction to legitimate users, creating a bad customer experience.

Banking and Financial Services Institute

Hitting the New Curveballs in Compliance

Maintaining compliance has never been easy or cheap, but banks have always known what they need to do. Financial institutions made plans and chugged along, and then some Big Things Happened. Those old plans aren't as useful anymore. Staff are pajama casual now, in terms of dress and, sometimes, in attention to cybersecurity.

BANKING AND FINANCIAL SERVICES INSTITUTE

Preventing sophisticated fraud attacks in financial services

For financial services institutions, keeping gross fraud loss in check isn’t a choice—it’s a business imperative. With the proliferation of apps that have adopted anti-bot technologies, attackers are finding it difficult to identify soft targets, especially in banking. Instead of expending resources in an attempt to circumvent anti-automation technologies, fraudsters are pivoting and attacking unprotected email servers that become the steppingstone to the ultimate goal: your customer accounts.Preventing sophisticated fraud attacks in financial services


FEATURED U.S. FEDERAL GOVERNMENT WEBINARS

US Federal

Prioritizing IT Modernization Tech Spend for New Infrastructure Bill

Learn key trends and initiatives driving IT modernization in the public sector to prioritize tech spend with the Infrastructure bill.

US Federal

Intro to APM Automation

As organizations look at adopting F5 Automated Toolchain, one of the most common questions is how to automate the build of BIG-IP APM policies. In this session, you will learn the framework for creating polices using iControlREST. 

US Federal

Automating BIG-IP with Terraform

Over the past several years, Hashicorp's Terraform has become the tool of choice for many enterprises embracing the DevOps approach to infrastructure management. This session will explore some introductory examples of how to deploy F5 instances into your public cloud infrastructure using Terraform.

US Federal

Unique Challenges with Multi-Cloud Networking in the Public Sector

Join this webinar to learn the latest multi-cloud networking trends and challenges in the public sector, and ways to mitigate performance and security risks.

US Federal

Meeting OWASP Top 10 Compliance with F5 Adv WAF

In this session, you'll learn how F5 Advanced WAF has made mitigating OWASP's top threats easy via a compliance-driven inteface that enables WAF administrators to manage security risks as needed on a per-app basis. We'll also demonstrate how the OWASP dashboard provides a security posture across all protected apps as they relate to OWASP top 10 security risks.

US Federal

How to Migrate a BIG-IP Configuration from VE to Cloud

Join this session to learn about Ansible and how to automate F5 BIG-IP configurations using Ansible Tower. We'll begin with a presentation on Ansible and a demonstration of how BIG-IP can be automated.

US Federal

API Management with NGINX

According to Gartner, by 2022 API abuses will be the leading attack vector for data breaches within enterprise web applications. This session will take you through the NGINX API Gateway deployment and base features as they relate to API creation, management, and basic API security.

US Federal

Securing Containerized Apps from Within: NGINX App Protect

With organizations realizing the benefits of containerized environments, they also have a need to secure the applications within those environments. This session explores the deployment scenarios and features of NGINX App Protect.

ALL WEBINARS

Simplifying Operations: Using BIG-IQ to upgrade BIG-IP

Join this webinar to learn how to manage multiple BIG-IP platforms by upgrading with BIG-IQ through real-world best practices and examples from the F5 team.

Proactive Planning for Old, New, and Emerging Security Vulnerabilities

Join this webinar to learn how to mitigate existing attacks and how to defend your organization from emerging security vulnerabilities.

Deploy & Secure Apps With No Wait via Cloud

Join this webinar to learn about F5's cloud-based security and the “easy-button” web application firewall (WAF) that doesn’t require infrastructure management.

OWASP Top 10 2021: The New Risk Order

Join our webinar to learn how the newest OWASP Top 10 act as a baseline in securing applications and how F5 Web App and API solutions can help mitigate risk.

2022 Application Threat Report

Join this webinar to learn the economic impacts of F5 Distributed Cloud Security from the Forrester TEI study including reducing costs & easing login friction.

Bridging the Divide: Modern API Management

Learn how F5 and NGINX can help you achieve full API lifecycle management across multi-cloud environments for both traditional and modern apps.

Prevent Account Takeover Fraud and Keep Customer Trust

Join this webinar to learn to protect customers by aligning your security and fraud strategies, block tactics used by criminals to bypass defenses like CAPTCHAs and browser fingerprints.

Bridging the Divide: Modern App Development with F5 and NGINX

In our Bridging the Divide webinar series, we'll show how F5 and NGINX can help you bridge the divide between Dev and Ops with tools that deliver speed, security, and scale for modern app environments.

Telemetry for Scaling BIG-IP Infrastructure

Join us for this webinar to learn how to use telemetry with BIG-IP to automatically scale up your infrastructure.

2021 TLS Report: How Not to Configure HTTPS

Security misconfigurations in HTTPS can be found in even the world's largest websites. Join our webinar to learn how threat actors exploit these vulnerabilities.