BIG-IP APM Best Practices Part 2 - Live Walkthrough


Our first webinar—BIG-IP Access Policy Manager Best Practices—covered a handful of best practices on how to quickly scale up and maintain operations. As COVID-19 looks to have given us a new normal, it’s now time to think about longer term strategies to support a larger remote workforce.

In this webinar— APM Best Practices Part 2 – Live Walkthrough, we’ll dive deeper into best practices for remote access that support your security and productivity requirements, including live demos.

Join this webinar to learn how to:

  • Provide your users a smoother and more secure access experience featuring Identity Aware Access Proxy
  • Quickly remediate vulnerable remote desktop (RDP) exposure with secure privileged access
  • Easily increase security of SSH connections with ephemeral access
  • Protect your remote access logins from brute force and cred stuffing attacks with Shape Security integration





Corey Marshall

Director and Sr. Security Architect, F5 Networks

Chas Lesley

Sr. System Engineer, F5 Networks


Lee Slaughter

Security Solutions Marketing Mgr, F5 Networks

Thank you for registering. You may now access the webinar.

Go to the webinar