VERANSTALTUNGEN

Webinare

FEATURED WEBINAR

How F5 and Microsoft Jointly Deliver Zero Trust Application Access

Zero Trust is a powerful strategy that can help a business be more secure and productive. In today's digital world, a Zero Trust security approach is even more business-critical as companies address how to operate remotely today and in the future. Zero Trust is an architectural framework that assumes no user inside or outside a network is "trusted," and instills a variety of checks and balances that enhance security.

F5 and Microsoft have joined forces to provide a best-in-class Zero Trust approach to securely access all your applications.

Register Now


How F5 and Microsoft Jointly Deliver Zero Trust Application Access


APPLICATION PERFORMANCE AND AUTOMATION WEBINARS

APPLICATION PERFORMANCE AND AUTOMATION

Teamübergreifende Zusammenarbeit und Automatisierung, um schneller vom Code zum Kunden zu kommen

Im Interesse der Geschwindigkeit hat sich die Verantwortung für die Entwicklung und Bereitstellung von Anwendungen in Richtung der Entwickler verlagert. Die Vorteile sind nicht von er Hand zu weisen, es bestehen jedoch erhebliche Herausforderungen.

APPLICATION PERFORMANCE AND AUTOMATION

Gain End-to-End Application Visibility And Reduce Mean Time To Repair (MTTR) With F5 Beacon

Gain visibility into all your applications and architectures, reduce Mean Time To Repair (MTTR) by quickly identifying where issues are in the application path, and get actionable insights for better informed decisions.

APPLICATION PERFORMANCE AND AUTOMATION

Beheben von Anwendungsintegritäts- und -leistungsproblemen mit F5

Sie können es sich nicht leisten, Stunden oder gar Tage damit zu verbringen, Probleme mit der Leistung von Anwendungen zu lösen. Erfahren Sie, wie Sie Anwendungsprobleme schnell erkennen und diagnostizieren können.

APPLICATION PERFORMANCE AND AUTOMATION

Automatisierung von DevOps- und SecOps-Bereitstellungen mit CI/CD-Pipeline-Integrationen

Erhöhen Sie die Geschwindigkeit von CI/CD durch die Integration von Automatisierungen. In diesem Webinar erfahren Sie, wie automatisierte Richtlinien integriert werden.


NEUESTE SICHERHEITSWEBINARE

SICHERHEIT

F5 Labs 2019 TLS Telemetry Report: The Changing World of Encryption on the Web

In F5 Labs latest 2019 TLS Telemetry Report they’ve expanded their scope to look at not only how organizations are using TLS protocols and ciphers, but also how they’re using certificates and supporting protocols. In this webinar, we’ll cover the results of F5 Labs global scanning and uncover how malware is increasingly using encrypted protocols to hide its activities.

SICHERHEIT

The Power of Data Interchange to Investigate Application Attacks

Shape Security threat research recently partnered with one of our customers to investigate a mysterious case involving online bookings that were producing a spike in no-shows. An innovative automation attack was uncovered, impacting not only this customer but a number of brands across industries – Shape brought deep data and insights available from the Shape Network to the investigation.

SICHERHEIT

The Risks and Rewards of Expanded VPN Deployments

In this webinar, we will identify four major risk areas: overall network architecture, access control, denial-of-service, and endpoints. Key Learning Objectives: How VPNs can change an organization's network security posture in unexpected ways. Insights into the importance of authentication and VPN application risks.

SICHERHEIT

Stop Fraud Without Friction: How to stay ahead of motivated attackers

Any business that operates e-commerce applications or manages user accounts of value is a potential target and the consequences are significant - account takeover (ATO), fraud losses, and damaged brand to name a few.  In this webinar, how to defeat your adversaries and protect your business from online fraud

SICHERHEIT

Enabling Advanced Application Security

Today’s threat landscape requires applications to be available, secure and agile.F5’s App Protect Solutions meet these needs head-on, providing security that integrates with CI/CD pipelines to ease and responds to new and changing threats. See how our App Protect Solutions for both customer-managed and outsourced solutions can be tailored to your needs.

SICHERHEIT

OWASP Top 10: Eine Retrospektive aus der echten Welt

Informieren Sie sich über die Auswirkungen der OWASP Top 10 in der echten Welt und erfahren Sie, warum diese Ihnen hilft, im Zeitalter der digitalen Transformation eine fundierte Sicherheitslage beizubehalten. Wir untersuchen die jüngsten Angriffe, die die OWASP Top 10-Schwachstellen ausgenutzt haben.

SICHERHEIT

How To Improve the ROI of SSL/TLS Visibility Solutions – Featuring Forrester

Join F5 and guest speakers from Forrester as they walk through the details of the Total Economic Impact™ study and to learn the benefits that F5 SSL/TLS Visibility solution brings when combatting security threats that hide within encrypted traffic.

SICHERHEIT

Trends bei Sicherheitsverletzungen von F5 Labs: Neue Architekturen, alte Angriffe

Bei der Datenerhebung für den Application Protection Report 2019 konzentrierten sich die Analysten von F5Labs auf das Thema, wie Trends in der Anwendungsarchitektur das Risiko erhöhen. Die Analysten von F5Labs untersuchen, was wir aus dem Bericht 2019 gelernt haben und welche Maßnahmen Organisationen ergreifen müssen, um geschützt zu bleiben.


NEUESTE SERVICE-PROVIDER-WEBINARE

Service-Provider

5G ist eine Gelegenheit zur Gewährleistung von Sicherheit

Nehmen Sie an diesem Webcast teil, um mehr über die wichtigsten Ergebnisse der Studie „Heavy Reading 5G Security Market Leadership“ aus dem Jahr 2019 zu erfahren, in der führende Anbieter ihre 5G-Sicherheitspläne zusammentragen.

Service-Provider

Selbstkonfigurierende NFV-Paketlösungen für eine schnelle und flexible Bereitstellung

Die Virtualisierung kann bei der Überprovisionierung Ihres Netzwerks helfen. Erfahren Sie, wie F5 die Implementierung von NFV erleichtert. So können Sie neue Dienste per Mausklick bereitstellen (und beenden).

Service-Provider

Echte Strategien für die Bereitstellung von 5G

Nehmen Sie an diesem Webinar teil und erfahren Sie mehr über 5G-Strategien für Service-Provider, einschließlich Virtualisierung für vorhersehbare Skalierung, MEC und benutzerspezifische Technologien für Sicherheitsrichtlinien.

Service-Provider

Sicherung der 5G-Netze: Diskussion im Rahmen der Industrieforschung

In diesem Webinar werden Forschungsergebnisse von Heavy Reading vorgestellt, die führende Service-Provider untersucht haben, um eine fundierte Übersicht über die Strategien und Zeitpläne zu erhalten, die sie zur Sicherung ihrer 5G-Netze anwenden sollten.

Service Provider

How 5G Success Starts With Your Infrastructure

Cloud-native infrastructure is foundational to a Service Provider’s 5G success. The ability to define, manage, and control 5G cloud-native infrastructure enables Service Providers to bring processing power within sub millisecond latency to the edge of the network, opening up a new world of innovation opportunities for customers.


FEATURED BANKING AND FINANCIAL SERVICES INSTITUTE (BFSI) WEBINARS

Banking and Financial Services Institute

Balancing App Innovation and Cybersecurity in Financial Services

Attackers are becoming increasingly sophisticated in banking and financial services. Bad actors are now exploiting new vulnerabilities associated with innovative apps aimed to improve customer convenience. Indeed, only 43% of consumers believe companies are doing enough to protect their personal information. Attend this webinar and discover how financial services institutions can balance customer. convenience with evolving cybersecurity threats

Banking and Financial Services Institute

Uncovering Encrypted Threats in FSI

TLS/SSL is a key technology for Internet security. While mostly beneficial, it can also be used for malicious purposes. Join F5 to learn how to uncover encrypted threats to your organization. Our Solutions Engineers will present the risks of using TLS/SSL encryption and demonstrate how they can be easily mitigated.

Banking and Financial Services Institute

Using AI to Break the Cycle of Online Fraud

Juniper Research estimates that global online fraud losses are projected to be more than $48 billion per year by 2023, despite massive investments in tools and staff to mitigate the risk. Clearly, current strategies are not effective.  Fraud tools can be difficult to maintain and may insert friction to legitimate users, creating a bad customer experience.

Banking and Financial Services Institute

Defeating Application Fraud in a Multi-Cloud World

Get the new blueprint for keeping your financial institution secure - Online fraud losses from application attacks are estimated to exceed $48 billion per year by 2023, making applications the single most lucrative targets for cybercriminals. Financial  institutions are naturally at risk, especially those currently maintaining open-banking platforms, migrating cloud applications or struggling to rapidly develop and deploy applications.

Banking and Financial Services Institute

Hitting the New Curveballs in Compliance

Maintaining compliance has never been easy or cheap, but banks have always known what they need to do. Financial institutions made plans and chugged along, and then some Big Things Happened. Those old plans aren't as useful anymore. Staff are pajama casual now, in terms of dress and, sometimes, in attention to cybersecurity.

Banking and Financial Services Institute

Preventing sophisticated fraud attacks in financial services

For financial services institutions, keeping gross fraud loss in check isn’t a choice—it’s a business imperative. With the proliferation of apps that have adopted anti-bot technologies, attackers are finding it difficult to identify soft targets, especially in banking. Instead of expending resources in an attempt to circumvent anti-automation technologies, fraudsters are pivoting and attacking unprotected email servers that become the steppingstone to the ultimate goal: your customer accounts.


FEATURED U.S. FEDERAL GOVERNMENT WEBINARS

US Federal

What is NGINX and How Can it Help My Agency?

Digital transformation—and the journey to modernizing apps and infrastructure—is different for each customer. In this session, we'll discuss the NGINX platform, how it helps reduce tool sprawl, and its lightweight footprint and flexibility of use within a micro-services-based architecture.

US Federal

Intro to APM Automation

As organizations look at adopting F5 Automated Toolchain, one of the most common questions is how to automate the build of BIG-IP APM policies. In this session, you will learn the framework for creating polices using iControlREST. 

US Federal

Automating BIG-IP with Terraform

Over the past several years, Hashicorp's Terraform has become the tool of choice for many enterprises embracing the DevOps approach to infrastructure management. This session will explore some introductory examples of how to deploy F5 instances into your public cloud infrastructure using Terraform.

US Federal

Automating BIG-IP in Multi-Cloud Environments with BIG-IQ

As DevOps continues to press its case inside of IT, we've seen the adoption of automation and "as code" methodologies. This includes the growing use of CI/CD tools like GitHub and Jenkins within the production pipeline. In this session, we'll explore how supporting infrastructure as code means maintaining support for cloud templates as well as providing for the declarative onboarding of BIG-IP in any environment.

US Federal

Meeting OWASP Top 10 Compliance with F5 Adv WAF

In this session, you'll learn how F5 Advanced WAF has made mitigating OWASP's top threats easy via a compliance-driven inteface that enables WAF administrators to manage security risks as needed on a per-app basis. We'll also demonstrate how the OWASP dashboard provides a security posture across all protected apps as they relate to OWASP top 10 security risks.

US Federal

How to Migrate a BIG-IP Configuration from VE to Cloud

Join this session to learn about Ansible and how to automate F5 BIG-IP configurations using Ansible Tower. We'll begin with a presentation on Ansible and a demonstration of how BIG-IP can be automated.

US Federal

API Management with NGINX

According to Gartner, by 2022 API abuses will be the leading attack vector for data breaches within enterprise web applications. This session will take you through the NGINX API Gateway deployment and base features as they relate to API creation, management, and basic API security.

US Federal

Securing Containerized Apps from Within: NGINX App Protect

With organizations realizing the benefits of containerized environments, they also have a need to secure the applications within those environments. This session explores the deployment scenarios and features of NGINX App Protect.

ALLE WEBINARE

Automating and Orchestrating the Delivery of Network and Security Services with F5

Embrace networking and security automation. Keep your apps safe. Learn how in this webinar.

Addressing Multi-cloud Application Management with F5

In this webinar, discover how to align people, processes, and technologies to deliver consistent, high-quality app performance—across clouds.

Optimize and Secure Your Container-based Apps with F5

Much of what makes containers great also makes them potential security risks. This webinar will help you bridge your containers and your BIG-IP.

Zero Touch Application Delivery with F5 BIG-IP, Terraform and Consul

In our Bridging the Divide webinar series, we'll show how F5 and NGINX can help you bridge the divide between Dev and Ops with tools that deliver speed, security, and scale for modern app environments.

Troubleshoot Your Application Health and Performance with F5

You can't afford to wait hours, or even days, to address app performance issues. Learn how to detect and diagnose app issues fast.

Collaborating and Automating Across Teams

App development and deployment have been shifting towards developers in the interest of speed. While the benefits are real, significant security threats, compliance requirements, and operational concerns remain. In our webinar on February 18, we will explore how teams are experiencing these changes and grappling with the challenges.