Featured
Keys to Making Distributed Multi-Cloud App Environments Easier to Manage
Ian Dinno Senior Manager, Product Marketing - F5 & Rahul Phadke, Product Management - F5
Most organizations today have apps and APIs deployed across multiple different architectures as choosing the right environment for each application —a specific public cloud, edge location, and/or on-premises data center— is important to best serve the needs of the business. However, that flexibility comes at a high price: managing complex, disparate environments, significantly increased operational complexity and cost, loss of end-to-end visibility into the health and performance of digital services, and an exponentially expanding surface area for potential cyberattacks. These distributed environments represent a new normal, so it’s critical to mitigate the operational complexity that accompanies them.
Join the conversation to hear answers to hard-hitting questions about making distributed environments easier to connect, manage and secure.
All episodes
-
Bots to Board Room: The Often-Missed Economic Impact of Bots
Jim Downey, Cybersecurity Evangelist - F5 & Joshua Haslett, Strategic Technology Partner Manager - Google Cloud
While security and operations teams care deeply about their ability to deliver the best experience possible for their customers while enhancing operational efficiencies, there is plenty left for the board and the executive staff to consider when it comes to bots and automated attacks.
F5 Distributed Cloud Bot Defense for Google Cloud enables frictionless security that complements performance, automation, and insight to deliver and scale the application experience.
Join the conversation to determine the economic impact of bots on your business so you can demonstrate to the board that the top and bottom lines are safe from bot-generated compromise.
By watching this session, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
-
Stop Bad Actors From Attacking Your Mobile Apps
Peter Zavlaris, Cyber Security Evangelist - F5 & Joshua Haslettm, Strategic Technology Partner Manager - Google Cloud
Attackers will repackage mobile apps, inject malware, hooking frameworks, and perform overlay attacks to cause security breaches, data leaks, and gain privileged access. Once a mobile app is controlled or hijacked, attackers can attack your server-side applications using automated attacks. They will also steal sensitive data that resides in your mobile apps, such as customer credentials, API keys, and intellectual property. You are on the hook for rigorous compliance standards for privacy (ex: GDPR, CCPA), payments (ex: EMVCo SBMP, PCI, & PSD2), and health records (HIPAA).
Part of picking the right infrastructure is knowing you can extend secure experiences to mobile applications. With intellectual property and sensitive information flowing through these mobile apps, it’s important to understand the risk and what you can do to make this a safe channel for your business.
You’ll also learn more about F5’s new mobile app security solution which can help you reduce security risk and meet compliance. Join the conversation and see how mobile application security can be a bigger part of your secure application vision.
-
Untangling APIs: Addressing Sprawl and Securing Your Digital Ecosystem
Ian Dinno Senior Manager, Product Marketing - F5 & David Remington, Director of Product Management - F5
As organizations increasingly adopt hybrid architectures and microservices, the number of APIs utilized within their ecosystems continues to grow at an exponential rate. This phenomenon, known as API sprawl, poses significant challenges in terms of security, governance, and efficiency. But of them all, API security might require the most urgent response.
For organizations trying to secure their APIs, multi-cloud complexity and difficulty enforcing consistent security top the list of challenges according to F5’s State of Application Strategy Report (2023). To address API sprawl, organizations need to adopt a more holistic app and API security strategy for their organization including components that deliver runtime protection, posture management, and help integrate security and code testing earlier in the software development lifecycle.
Join the conversation to hear Joshua Haslett, Ian Dinno, and David Remington's answers to hard-hitting questions about API sprawl, management and security.
-
Thwart the Account Takeover Menace – Join the API Security Conversation
Angel Grant Vice President, Security - F5 & Joshua Haslett Strategic Technology Partner Manager - Google Cloud
APIs have become one of cybercriminals’ favorite vectors for account takeover attacks. Credential stuffing, business logic abuse, and DDoS attacks are just some of the malicious automated bot attacks deployed to take over accounts and perpetrate identity theft and fraud.
Readily available scripts and tools make orchestrating API attacks easier than ever, and legacy bot defense techniques struggle to detect these potentially devastating incursions. Thus, it’s no surprise that, according to recent Google Cloud research, 50% of organizations experienced an API security incident in the past 12 months.*
With such a dire threat via APIs negatively impacting user data and the bottom line, F5 and Google Cloud are hosting a panel discussion to answer your pressing questions about API security and tactics.
-
Keys to Making Distributed Multi-Cloud App Environments Easier to Manage
Ian Dinno Senior Manager, Product Marketing - F5 & Rahul Phadke, Product Management - F5
Most organizations today have apps and APIs deployed across multiple different architectures as choosing the right environment for each application —a specific public cloud, edge location, and/or on-premises data center— is important to best serve the needs of the business. However, that flexibility comes at a high price: managing complex, disparate environments, significantly increased operational complexity and cost, loss of end-to-end visibility into the health and performance of digital services, and an exponentially expanding surface area for potential cyberattacks. These distributed environments represent a new normal, so it’s critical to mitigate the operational complexity that accompanies them.
Join the conversation to hear answers to hard-hitting questions about making distributed environments easier to connect, manage and secure.