Technical and Service Provider Breakouts
|
|
- Scarlett Simon
- 5 years ago
- Views:
Transcription
1 1 of :59 Technical and Breakouts Session Time Session Focus Title and Overview Speaker Synthesis Technical overview of SDAS and F5's Reference Architectures Steve Allie Technical overview of Synthesis, Software Defined Application Services and F5's, and Mobility Reference Architectures Multi Layer DDoS Mitigation - The 269 new Mitigation Details in the DDoS Protection Reference Architecture Joakim Sunberg Distributed Denial-of-Service attacks are top of mind for organisations in Attackers are exploiting amplification techniques for volumetric attacks while also increasing the sophistication of their application level attacks. Organisations must focus on designing the right DDoS protection architecture to effectively mitigate sophisticated multi-layer attacks. In this session you will learn how the right architecture can mitigate modern DDoS attacks, from ICMP fragmentation grenades to the latest in SSL brute force key exchange attacks. We ll also review some key customer tools including a DDoS Best Practices guide and the DDoS Survival Handbook which provide critical guidance to simplify and ensure successful deployment of your architecture. Enterprise / Core Scale your DNS Infrastructure to Ensure App and Service Availability Nigel Ashworth DNS traffic has grown over 100% in the last 5 years. This increase in volume is largely attributed to the rollout of new services and applications to support the growing mobile lifestyle. In order to meet growing DNS demands, organisations often increase DNS capacity by adding more servers, in turn increasing costs. DNS also continues to be a target for attacks, degrading DNS performance, causing outages or worse, directing browsers/visitors to malicious impersonators. Learn how to architect intelligent DNS solutions that helps scale your DNS infrastructure, improve performance, mitigate attacks, and reduce data centre costs. / Core F5 Management Solution - BIG-IQ Technical Deep Dive Nicolas Menant A key pillar of F5 s Synthesis architecture, BIG-IQ is an intelligent framework for managing and orchestrating the delivery of application services both locally and in public and private clouds. With a live demo, you ll see how BIG-IQ manages and orchestrates application delivery and how you can manage BIG-IP devices across your enterprise. Orchestration of application delivery in Amazon AWS, OpenStack and VMware NSX will be covered, as will management of F5 s ASM and AFM security devices. Open Stack, SDN Christian Koenning This session looks at OpenStack - a popular choice to manage compute, storage, and networking resources in private and public cloud environments in the service provider environment. With F5 s focus on development of Layer 4-7 application services to augment existing SDN solutions, attend to see an overview of how F5 integrates with these technologies and architectures. Migration / Bursting / Orchestration Gary Newe / Vincent Lavergne Successful cloud computing depends on integrating application services across data centres seamlessly without impact to user experience. F5 s Migration solution does this and more, optimising application delivery services across traditional and cloud architectures. Join us for a technical review on how F5's Migration solution automates and orchestrates the deployment of application delivery services across both traditional and cloud infrastructures. Whether an organisation is adopting a public, private, or hybrid cloud, F5 simplifies the optimisation of business applications, ensuring that they re fast, secure, and available wherever they are. Find out how BIG-IQ integrates with existing cloud management and orchestration engines to streamline overall application deployment. See the demo on how F5's iapps Templates and self-service model can rapidly provision application delivery services, enabling new applications to be made available to users in minutes instead of weeks. Prevent Application and Malware attacks with F5 WebSafe and Mobilesafe Alfredo Vistola This session examines WebSafe s ability to detect web fraud by monitoring the integrity of the session data that the application expects to see between itself and the browser. This method isn t vulnerable to zero-day threats: malware variants, new proxy/masking techniques, or fraudulent activity originating from devices, locations or users who haven t yet accumulated digital fraud fingerprints. VMware and F5 - Joint Solution VMware and F5 - Technical Solution Michael Koyfman / Garry Owen, VMware F5 s and VMware have a strategic alliance around VDI and End User computing. In this session we will cover how F5 integrates in to the VMware infrastructure and the benefits of deploying F5 s application services.
2 2 of :59 Programmability(T): icall, icontrol, irules use cases, on-demand TMOS Deep Dive - The Secrets to Customisation and Automation Get the most out of your BIG-IP with the near limitless capabilities of our programmable APIs. In this advanced sessions F5 experts will guide you through getting the most out of your F5 device s programmatic features. Tools, tips, tricks of the trade and more will all be covered along with some advanced examples of irules, icontrol REST and iapps, as well as a healthy focus on Q&A. Bring your questions, problems to solve and curiosity, and learn just how far you can go with F5 s APIs. Philippe Cloup / Aaron Hooley GI Consolidation - Streamline to Save Money and Enhance Network Quality Bart Salaets Many vendors sell point products that meet specific functional requirements but contribute to device sprawl in the S/Gi network. The F5 solution offers a unified framework that delivers critical network services with massive scalability and performance, along with significant flexibility, extensibility, and NFV-readiness. Join F5's SP Solution Architect and learn how you can deploy fewer servers, simplify your network, and increase network availability with less risk of point product failures that can take down your entire S/Gi network. Cisco and F5 - Joint Solution Cisco ACI/VMDC Nicolas Menant / Cisco Solution Architect Cisco is pushing the Application Centric Infrastructure (ACI) and the Virtualized Multiservice Data Centre (VMDC). In this session, learn how F5 integrates into the ACI automation framework to deliver software defined application services. Multi Layer DDoS Mitigation - The 269 new Mitigation Details in the DDoS Protection Reference Architecture Joakim Sundberg Distributed Denial-of-Service attacks are top of mind for organisations in Attackers are exploiting amplification techniques for volumetric attacks while also increasing the sophistication of their application level attacks. Organisations must focus on designing the right DDoS protection architecture to effectively mitigate sophisticated multi-layer attacks. In this session you will learn how the right architecture can mitigate modern DDoS attacks, from ICMP fragmentation grenades to the latest in SSL brute force key exchange attacks. We ll also review some key customer tools including a DDoS Best Practices guide and the DDoS Survival Handbook which provide critical guidance to simplify and ensure successful deployment of your architecture. Protect your internal users on the Internet with Secure Web Gateway Users need to use the Internet to do their jobs, but unfettered access opens up exposure to web-based threats, malware, misuse and lower productivity. This session examines how SWG s explicit proxy, URL filtering, and application delivery functions - on one platform means a simpler network, less management, and safer Internet access. Rich Bible Migration / Bursting / Orchestration Gary Newe / Vincent Lavergne Successful cloud computing depends on integrating application services across data centres seamlessly without impact to user experience. F5 s Migration solution does this and more, optimising application delivery services across traditional and cloud architectures. Join us for a technical review on how F5's Migration solution automates and orchestrates the deployment of application delivery services across both traditional and cloud infrastructures. Whether an organisation is adopting a public, private, or hybrid cloud, F5 simplifies the optimisation of business applications, ensuring that they re fast, secure, and available wherever they are. Find out how BIG-IQ integrates with existing cloud management and orchestration engines to streamline overall application deployment. See the demo on how F5's iapps Templates and self-service model can rapidly provision application delivery services, enabling new applications to be made available to users in minutes instead of weeks. Traffic Steering / PEM - Monetise your Data Traffic with Context Awareness Bart Salaets With a wide range of policy enforcement capabilities, F5 s Policy Enforcement Manager (PEM) delivers the insight you need to understand subscriber behaviour and effectively manage and control your subscribers' traffic streams. PEM provides the ability to inspect application content and enforce policies based on user or system defined criteria. Policies may rate-limit, drop, DSCP/TOS mark, and intelligently steer subscriber flows to value added services platforms to deliver new revenue models and optimise utilisation of VAS systems. Understand how intelligent service chaining can be achieved, with a seamless evolution to an NFV/SDN architecture, and discover how PEM can be utilised to provide the foundation for a flexible and dynamic model to enhance subscribers' data experience while increasing revenue from previously hard to deliver services. Enterprise / Core Scale your DNS Infrastructure to Ensure App and Service Availability Nigel Ashworth DNS traffic has grown over 100% in the last 5 years. This increase in volume is largely attributed to the rollout of new services and applications to support the growing mobile lifestyle. In order to meet growing DNS demands, organisations often increase DNS capacity by adding more servers, in turn increasing costs. DNS also continues to be a target for attacks, degrading DNS performance, causing outages or worse, directing browsers/visitors to malicious impersonators. Learn how to architect intelligent DNS solutions that helps scale your DNS infrastructure, improve
3 3 of :59 performance, mitigate attacks, and reduce data centre costs. Core / F5 Management Solution - BIG-IQ Technical Deep Dive Nicolas Menant A key pillar of F5 s Synthesis architecture, BIG-IQ is an intelligent framework for managing and orchestrating the delivery of application services both locally and in public and private clouds. With a live demo, you ll see how BIG-IQ manages and orchestrates application delivery and how you can manage BIG-IP devices across your enterprise. Orchestration of application delivery in Amazon AWS, OpenStack and VMware NSX will be covered, as will management of F5 s ASM and AFM security devices. Protect Your Internal Users on the Internet with Secure Web Gateway Richard Bible Users need to use the Internet to do their jobs, but unfettered access opens up exposure to web-based threats, malware, misuse and lower productivity. This session examines how SWG s explicit proxy, URL filtering, and application delivery functions - on one platform means a simpler network, less management, and safer Internet access. Federation / SAML Michael Koyfman With support for SAML 2.0, F5 now offers improved single sign-on (SSO) capabilities for web-based, VDI, and client/server applications whether hosted in corporate data centres or the cloud. In addition, this session will cover how BIG-IP APM offers identity federation across multiple product instances within an organisation, reducing the number of passwords needed by users to access corporate applications. Optimising TCP in today s changing network environment Philippe Cloup The need to juggle performance across wired, wireless and Wi-Fi networks is a challenge as each of these paths has very different characteristics when it comes to TCP. Tuning the TCP stack to be optimized for the varying degrees of packet loss, latency and congestion on the different connection types is a challenge. This session will cover tuning several aspects of your network and the underlying TCP stack to deliver an optimized application experience for all users. Topics will include: Choosing the correct Congestion Control algorithm Optimizing TCP with techniques like TCP buffering and adjusting TCP window sizes Rate-based pacing to help multiple request/responses over a single connection Multipath TCP to automatically work around failures by leveraging Wi-Fi and 3G Programmability(T): icall, icontrol, irules use cases, on-demand TMOS Deep Dive -The Secrets to Customisation and Automation Get the most out of your BIG-IP with the near limitless capabilities of our programmable APIs. In this advanced sessions F5 experts will guide you through getting the most out of your F5 device s programmatic features. Tools, tips, tricks of the trade and more will all be covered along with some advanced examples of irules, icontrol REST and iapps, as well as a healthy focus on Q&A. Bring your questions, problems to solve and curiosity, and learn just how far you can go with F5 s APIs. Philippe Cloup / Aaron Hooley Federation / SAML Michael Koyfman With support for SAML 2.0, F5 now offers improved single sign-on (SSO) capabilities for web-based, VDI, and client/server applications whether hosted in corporate data centres or the cloud. In addition, this session will cover how BIG-IP APM offers identity federation across multiple product instances within an organisation, reducing the number of passwords needed by users to access corporate applications. OpenStack, SDN Christian Koenning OpenStack continues to be a popular choice for organisations to manage compute, storage, and networking resources in private and public cloud environments. With F5 s focus on development of Layer 4-7 application services to augment existing SDN solutions, this session provides an overview of how F5 integrates with these technologies and architectures. Prevent Application and Malware attacks with F5 WebSafe and MobileSafe Alfredo Vistola This session examines WebSafe s ability to detect web fraud by monitoring the integrity of the session data that the application expects to see between itself and the browser. This method isn t vulnerable to zero-day threats: malware variants, new proxy/masking techniques, or fraudulent activity originating from devices, locations or users who haven t yet accumulated digital fraud fingerprints. LTE Roaming / DRA / Traffix Peter Nas As 4G LTE deployments are happening across the region, communication service providers must manage the growing volume and complexity of diameter signalling among many new network
4 4 of :59 elements. This session explores how LTE network rollout can be made far more scalable using a centralised Diameter routing platform. The F5 Traffix Signalling Delivery Controller (SDC) manages Diameter signalling to ensure top performance and reliability so you can scale to support an unlimited number of subscribers. You ll learn how to implement policy and charging rules and enforcement; enable network roaming; optimize online and offline charging with multiple vendors; and connect legacy and LTE systems. You ll also hear how SDC can play an important role in the upcoming 2014 EU Data Roaming regulations. F5 Networks 2014
5 5 of :59
Sichere Applikations- dienste
Sichere Applikations- dienste Innovate, Expand, Deliver Manny Rivelo Für SaaS und traditionelle Service-Modelle EVP, Strategic Solutions Carsten Langerbein Field Systems Engineer c.langerbein@f5.com Es
More informationF5 Networks in the Software Defined DataCenter Era. Paolo Pambianco System Engineer CSP
F5 Networks in the Software Defined DataCenter Era Paolo Pambianco System Engineer CSP p.pambianco@f5.com Data Center Transformation Business demands are driving changes in IT service delivery Driving
More informationF5 Synthesis Information Session. April, 2014
F5 Synthesis Information Session April, 2014 Agenda Welcome and Introduction to Customer Technology Challenges Software Defined Application Services Reference Architectures for Today s Customer Challenges
More informationOVERVIEW. Virtual Solutions for Your NFV Environment
Contents Introduction 3 Build a Virtualized Network with F5 s 4 Virtual Firewall (vfw) 4 Virtual CGNAT (vcgn) 4 Virtual Policy Charging Enforcement Function (vpcef) 4 Virtual Content Insertion (vci) 4
More informationF5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe
F5 comprehensive protection against application attacks Jakub Sumpich Territory Manager Eastern Europe j.sumpich@f5.com Evolving Security Threat Landscape cookie tampering Identity Extraction DNS Cache
More informationAdvanced threats. "Software defined" everything. Internet of Things. SDDC/Cloud. HTTP is the new TCP. Mobile. F5 Networks, Inc 2
F5 Software Defined Application Services F5 Synthesis Fred Wu Technical Director of F5 Networks China Advanced threats "Software defined" everything SDDC/Cloud Internet of Things Mobile HTTP is the new
More informationSimplifying Security for Mobile Networks
Simplifying Security for Mobile Networks Communications service providers face an array of complex challenges, from network growth and increasing security threats to technology transitions. The comprehensive
More informationSaaS. Public Cloud. Co-located SaaS Containers. Cloud
SaaS On-prem Private Cloud Public Cloud Co-located SaaS Containers APP SERVICES ACCESS TLS/SSL DNS NETWORK WAF LOAD BALANCING DNS ACCESS CONTROL SECURITY POLICIES F5 Beside the Cloud Why Get Closer to
More informationBIG-IP V11.3: PRODUCT UPDATE. David Perodin Field Systems Engineer III
BIG-IP V11.3: PRODUCT UPDATE David Perodin Field Systems Engineer III Contents V11.3 Product Update 1. BIG-IP v.11.3.0 (Local Traffic Manager & Access Policy Manager) 2. Advanced Firewall Module (AFM)
More informationCisco HyperFlex and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments
OVERVIEW + Cisco and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments KEY BENEFITS Quickly create private clouds Tested with industry-leading BIG-IP ADC platform Easily scale
More informationManagement and Orchestration with F5 BIG-IQ 4.5. Philippe Bogaerts F5 Networks
Management and Orchestration with F5 BIG-IQ 4.5 Philippe Bogaerts F5 Networks F5 Synthesis High-Performance Services Fabric Simplified Business Models F5 Networks, Inc 2 BIG-IQ in the Synthesis Framework
More informationOPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers.
OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers. INTRODUCTION F5 has innovated to help operators by embracing virtualization for the key elements of its portfolio, and
More informationWhat s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics
What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics Vision: Everything as a service Speed Scalability Speed to Market
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationSecuring LTE Networks What, Why, and How
Securing LTE Networks What, Why, and How As security threats evolve, service providers must implement comprehensive security for both their LTE network infrastructures and connected devices to protect
More informationSOLUTION GUIDE. F5 Security Solutions
SOLUTION GUIDE F5 Security Solutions Table of Contents F5 Synthesis 3 Software Defined Application Services 4 DDoS Protection 6 Web Fraud Protection 8 Advanced Firewall Management 10 Application Security
More informationCzas na nowe platformy sprzętowe F5! Dlaczego są to najbardziej programowalne urządzenia ADC na rynku
Czas na nowe platformy sprzętowe F5! Dlaczego są to najbardziej programowalne urządzenia ADC na rynku Maciej Iwanicki, Systems Engineer m.iwanicki@f5.com SOFTWARE & PLATFORM LIFECYCLE F5 Software Lifecycle
More informationDeploy F5 Application Delivery and Security Services in Private, Public, and Hybrid IT Cloud Environments
DATASHEET Deploy F5 Application Delivery and Security Services in Private, Public, and Hybrid IT Cloud Environments What s Inside 2 Primary Cloud Scenarios 2 Private Cloud Using Software-Defined Architectures
More informationBIG-IQ Cloud and VMware ESXi : Setup. Version 1.0
BIG-IQ Cloud and VMware ESXi : Setup Version 1.0 Table of Contents Table of Contents Legal Notices...5 Legal notices...5 Getting Started with BIG-IQ Virtual Edition...7 What is BIG-IQ Virtual Edition?...7
More informationHow to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud
PRESENTED BY How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud BIG-IP enables the enterprise to efficiently address security and performance when migrating to
More informationO365 Solutions. Three Phase Approach. Page 1 34
O365 Solutions Three Phase Approach msfttechteam@f5.com Page 1 34 Contents Use Cases... 2 Use Case One Advanced Traffic Management for WAP and ADFS farms... 2 Use Case Two BIG-IP with ADFS-PIP... 3 Phase
More informationArchitecture: Consolidated Platform. Eddie Augustine Major Accounts Manager: Federal
Architecture: Consolidated Platform Eddie Augustine Major Accounts Manager: Federal Current DoD Situation Stovepipes of Technology icontrol Customization irules Solutions Security Access Availability Load
More informationADC im Cloud - Zeitalter
ADC im Cloud - Zeitalter Applikationsdienste für Hybrid-Cloud- und Microservice-Szenarien Ralf Sydekum, SE Manager DACH, F5 Networks GmbH Some of the Public Cloud Related Questions You May Have.. It s
More informationBest Practice Deployment of F5 App Services in Private Clouds. Henry Tam, Senior Product Marketing Manager John Gruber, Sr. PM Solutions Architect
Best Practice Deployment of F5 App Services in Private Clouds Henry Tam, Senior Product Marketing Manager John Gruber, Sr. PM Solutions Architect Agenda 1 2 3 4 5 The trend of data center, private cloud
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationCloud, SDN and BIGIQ. Philippe Bogaerts Senior Field Systems Engineer
Cloud, SDN and BIGIQ Philippe Bogaerts Senior Field Systems Engineer Virtual Editions TMOS/LTM 12.0 Highlights 1 NIC support Azure Marketplace Kernel Independent driver Enhanced Hypervisor support F5 Networks,
More informationSAS and F5 integration at F5 Networks. Updates for Version 11.6
SAS and F5 integration at F5 Networks Updates for Version 11.6 Managing access based on Identity Employees Partner Customer Administrator IT challenges: Control access based on user-type and role Unify
More informationThe Programmable Network
Emerging software-defined data center solutions focus on the need for programmability in the network to reduce costs and realize the benefits of automation. Whether the goal is cloud computing or an SDN,
More informationSteelConnect. The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN
Data Sheet SteelConnect The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN The Business Challenge Delivery of applications is becoming more
More informationService Insertion with ACI using F5 iworkflow
Service Insertion with ACI using F5 iworkflow Gert Wolfis F5 EMEA Cloud SE October 2016 Agenda F5 and Cisco ACI Joint Solution Cisco ACI L4 L7 Service Insertion Overview F5 and Cisco ACI Integration Models
More informationOrchestration: Accelerate Deployments and Reduce Operational Risk. Nathan Pearce, Product Development SA Programmability & Orchestration Team
Orchestration: Accelerate Deployments and Reduce Operational Risk Nathan Pearce, Product Development SA Programmability & Orchestration Team Agenda 1 2 3 Industry Trends Customer Journey Use Cases 2016
More informationWe make hybrid cloud deliver the business outcomes you require
We make hybrid cloud deliver the business outcomes you require Leverage the optimum venues for your applications and workloads and accelerate your transformation as a digital business The business outcomes
More informationand public cloud infrastructure, including Amazon Web Services (AWS) and AWS GovCloud, Microsoft Azure and Azure Government Cloud.
DATA SHEET vthunder SOFTWARE FOR VIRTUAL & CLOUD INFRASTRUCTURE A10 vthunder software appliances enable organizations to SUPPORTED SOLUTIONS gain flexible, easy-to-deploy and high-performance secure application
More informationNETWORK AND SD-VPN. Meshing legacy and Cloud Service Providers
NETWORK AND SD-VPN NETWORK AND SD-VPN Reduced network overheads and complexity, and an agile approach to Network Transformation. Cloud Gateway lets you reduce appliance sprawl and network aggregation points
More informationSolutions Guide. F5 solutions for the emerging 5G landscape
Solutions Guide F5 solutions for the emerging 5G landscape 1 F5 Solutions for the emerging 5G landscape. Access Network Control Plane Cloud Mobile Edge and Core Analytics DNS EPC & IMS DDoS Mobile Access
More informationModelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer
Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:
More informationApplication Security. Rafal Chrusciel Senior Security Operations Analyst, F5 Networks
Application Security Rafal Chrusciel Senior Security Operations Analyst, F5 Networks r.chrusciel@f5.com Agenda Who are we? Anti-Fraud F5 Silverline DDOS protection WAFaaS Threat intelligence & malware
More informationSteelConnect. The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN
Data Sheet SteelConnect The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN The Business Challenge Delivery of applications is becoming
More informationF5-Networks Application Delivery Fundamentals. Download Full Version :
F5-Networks 771-101 Application Delivery Fundamentals Download Full Version : http://killexams.com/pass4sure/exam-detail/771-101 QUESTION: 219 Even though F5 is an application delivery controller, it can
More informationANNUAL REPORT SOLUTIONS FOR AN APPLICATION WORLD.
2013 ANNUAL REPORT SOLUTIONS FOR AN APPLICATION WORLD. TO OUR SHAREHOLDERS, CUSTOMERS AND PARTNERS: Following an uneven first half, fiscal 2013 concluded with a strong finish that positioned F5 for solid
More informationRE-ARCHITECTING THE GI LAN OPTIMIZE & MONETIZE MOBILE BROADBAND. Bart Salaets Solution Architect
RE-ARCHITECTING THE GI LAN OPTIMIZE & MONETIZE MOBILE BROADBAND Bart Salaets Solution Architect Today s Gi LAN is static and inflexible DNS PCRF AAA OCS CSCF RADIUS, Diameter, DNS, SIP Control Plane Services
More informationPulse Secure Application Delivery
DATA SHEET Pulse Secure Application Delivery HIGHLIGHTS Provides an Application Delivery and Load Balancing solution purposebuilt for high-performance Network Functions Virtualization (NFV) Uniquely customizable,
More informationBIG-IP Access Policy Manager and BIG-IP Edge Client for Windows Phone 8.1 v1.0.0
BIG-IP Access Policy Manager and BIG-IP Edge Client for Windows Phone 8.1 v1.0.0 BIG-IP Access Policy Manager and BIG-IP Edge Client for Windows Phone v8.1 v1.0.0.0 Contents 3 Contents Legal Notices...5
More informationComplying with PCI DSS 3.0
New PCI DSS standards are designed to help organizations keep credit card information secure, but can cause expensive implementation challenges. The F5 PCI DSS 3.0 solution allows organizations to protect
More informationCato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.
Cato Cloud Global SD-WAN with Built-in Network Security Solution Brief 1 Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The rise of cloud applications and mobile workforces
More informationVMware Hybrid Cloud Solution
VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach
More informationNever Drop a Call With TecInfo SIP Proxy White Paper
Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video
More informationOptimizing your network for the cloud-first world
Optimizing your network for the cloud-first world Why performing cloud and network modernization together assures seamless, reliable user app delivery. Citrix.com ebook Align Cloud Strategy to Business
More informationEdgeConnectSP The Premier SD-WAN Solution
SERVICE PROVIDER EdgeConnectSP The Premier SD-WAN Solution Build High-Performance Managed SD-WAN Services Challenges with Legacy WANs Significant shifts in application and traffic patterns, including the
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationThe Emerging Role of a CDN in Facilitating Secure Cloud Deployments
White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationVMworld 2015 Track Names and Descriptions
Software- Defined Data Center Software- Defined Data Center General VMworld 2015 Track Names and Descriptions Pioneered by VMware and recognized as groundbreaking by the industry and analysts, the VMware
More informationSecuring the Software-Defined Data Center
Securing the Software-Defined Data Center The future of the data center is software defined Key Advantages McAfee Network Platform 8.4 Delivers best-in-class IPS security across physical and softwaredefined
More informationNETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.
NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING. The old mantra of trust but verify just is not working. Never trust and verify is how we must apply security in this era of sophisticated breaches.
More informationNetwork Functions Virtualization - Everything Old Is New Again
Network Functions Virtualization - Everything Old Is New Again Service providers are looking to use network functions virtualization (NFV) to build dynamic, virtualized networks with application and content
More informationSecuring the Next Generation Data Center
Securing the Next Generation Data Center Petr Kadrmas SE Eastern Europe 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED]
More informationAWS Reference Design Document
AWS Reference Design Document Contents Overview... 1 Amazon Web Services (AWS), Public Cloud and the New Security Challenges... 1 Security at the Speed of DevOps... 2 Securing East-West and North-South
More informationComprehensive datacenter protection
Comprehensive datacenter protection There are several key drivers that are influencing the DDoS Protection market: DDoS attacks are increasing in frequency DDoS attacks are increasing in size DoS attack
More information6 KEY SECURITY REQUIREMENTS
KEY SECURITY REQUIREMENTS for Next Generation Mobile Networks A Prevention-Oriented Approach to in Evolving Mobile Network Ecosystems A Prevention-Oriented Approach to in Evolving Mobile Network Ecosystems
More informationToday s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps
Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of
More informationSOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN
S O L U T I O N O V E R V I E W SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN Today s branch office users are consuming more wide area network (WAN) bandwidth
More informationEnabling Public Cloud Interconnect Services F5 Application Connector
Enabling Public Cloud Interconnect Services F5 Application Connector Crystal Bong, Product Manager Emergence of Cloud Interconnect These common services are hard to replicate, control, and do not run cheaply
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationWe b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)
We b Ap p A t ac ks U ser / Iden tity 33% 53% Apps And Identities Initial Targets In 86% Of Breaches P hysi ca l 11% Other (VPN, PoS,infra.) 3% Fix vulnerabilities Stop web attacks Risk & compliance What
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationMulti-Domain Service Optimization
Multi-Domain Service Optimization 1. High-level summary New solutions need to be fifth-generation (5G)- and service-ready while covering the entire network along with individual network slice instances
More informationPreparing your network for the next wave of innovation
Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt
More informationManaging the Migration to IPv6 Throughout the Service Provider Network White Paper
Managing the Migration to IPv6 Throughout the Service Provider Network Managing the Migration to IPv6 Throughout the Service Provider Network White Paper Introduction Service providers are feeling increasing
More informationF5 and Nuage Networks Partnership Overview for Enterprises
Partnership Overview for Enterprises Automate and accelerate application and network services deployment with. Key benefits enable you to: Deploy a flexible, agile, and programmable network that can instantiate
More informationBIG-IP System: Initial Configuration. Version 12.0
BIG-IP System: Initial Configuration Version 12.0 Table of Contents Table of Contents Legal Notices...5 Legal notices...5 Introduction to BIG-IP Initial Configuration...7 About BIG-IP initial configuration...7
More informationMODERNIZE YOUR DATA CENTER. With Cisco Nexus Switches
MODERNIZE YOUR DATA CENTER With Cisco Nexus Switches TABLE OF CONTENTS TABLE OF CONTENTS Data Center Needs are Changing Cisco Nexus Switches Lead the Transition to a Next Generation Data Center Outcomes
More informationThe F5 Application Services Reference Architecture
The F5 Application Services Reference Architecture Build elastic, flexible application delivery fabrics that are ready to meet the challenges of optimizing and securing applications in a constantly evolving
More informationTransformation Through Innovation
Transformation Through Innovation A service provider strategy to prosper from digitization People will have 11.6 billion mobile-ready devices and connections by 2020. For service providers to thrive today
More informationEvolution of Data Center Security Automated Security for Today s Dynamic Data Centers
Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any
More informationRETHINKING DATA CENTER SECURITY. Reed Shipley Field Systems Engineer, CISSP State / Local Government & Education
RETHINKING DATA CENTER SECURITY Reed Shipley r.shipley@f5.com Field Systems Engineer, CISSP State / Local Government & Education http://gcn.com/blogs/cybereye/2013/10/it-professionals-survey.aspx September
More informationRevolutionising mobile networks with SDN and NFV
Revolutionising mobile networks with SDN and NFV Cambridge Wireless Virtual Networks SIG 8 th May 2014 Philip Bridge, Senior Network Architect at EE May 2014 Networks are getting messy Vertically integrated
More informationSimplifying WAN Architecture
Simplifying WAN Architecture Migrating without a network forklift upgrade Phased approach with existing environment Architecture and management complexity Automation of deployment, management and maintenance
More informationMcAfee Virtual Network Security Platform
McAfee Virtual Network Security Platform Complete threat detection for cloud networks McAfee Virtual Network Security Platform is a complete network threat and intrusion prevention system (IPS) solution
More informationPresenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe
Presenting the ware NSX ECO System May 2015 Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe Agenda 10:15-11:00 ware NSX, the Network Virtualization Platform 11.15-12.00 Palo Alto
More informationBIG-IP Application Security Manager : Implementations. Version 11.3
BIG-IP Application Security Manager : Implementations Version 11.3 Table of Contents Table of Contents Legal Notices...7 Chapter 1: Automatically Synchronizing Application Security Configurations...9
More informationActual Agility with SDN: Weaving SDN into Data Center Automation May 6, John Burke Principal Research Analyst & CIO
Actual Agility with SDN: Weaving SDN into Data Center Automation May 6, 2016 John Burke Principal Research Analyst & CIO john@nemertes Agenda ± Introductions ± SDN Adoption ± Cloud Management Adoption
More informationTraffic Steering & Service Chaining
Traffic Steering & Service Chaining Optimize & Monetize with PEM Bart Salaets Solution Architect Agenda F5 Gi LAN Strategy Traffic Steering & Service Chaining Recent Evolutions Policy-Based Per-Flow and
More informationVideo-Aware Networking: Automating Networks and Applications to Simplify the Future of Video
Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video The future of video is in the network We live in a world where more and more video is shifting to IP and mobile.
More informationIBM Security Access Manager
IBM Access Manager Take back control of access management with an integrated platform for web, mobile and cloud Highlights Protect critical assets with risk-based and multi-factor authentication Secure
More informationNetworks
Networks +617 3222 2555 info@citec.com.au Queensland Government Network (QGN) Our Queensland Government Network (QGN) is central to the ICT services we provide. It is a government owned and managed network,
More informationWEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING
WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING A STRONG PARTNER COMPANY Link11 - longstanding security experience Link11 is a European IT security provider, headquartered in Frankfurt, Germany
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationService Automation Made Easy
Service Automation Made Easy Networks that know how to customize the network experience for every subscriber Challenge Service providers want to quickly develop and deliver personalized services their
More informationIMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES
Daitan White Paper IMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES Highly Reliable Software Development Services http://www.daitangroup.com Daitan Group 2014 IMS, NFV
More informationIntelligent and Secure Network
Intelligent and Secure Network BIG-IP IP Global Delivery Intelligence v11.2 IP Intelligence Service Brian Boyan - b.boyan@f5.com Tony Ganzer t.ganzer@f5.com 2 Agenda Welcome & Intro Introduce F5 IP Intelligence
More informationReal-time Communications Security and SDN
Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,
More informationCisco APIC Enterprise Module Simplifies Network Operations
Cisco APIC Enterprise Module Simplifies Network Operations October 2015 Prepared by: Zeus Kerravala Cisco APIC Enterprise Module Simplifies Network Operations by Zeus Kerravala October 2015 º º º º º º
More informationDrive Greater Value from Your Cisco Deployment with Radware Solutions
Drive Greater Value from Your Cisco Deployment with Radware Solutions Ron Meyran Director, Alliances Marketing Feb 24, 2015 Introducing Radware Radware/Cisco Solution Mapping Solutions Overview & Differentiators
More informationAlgoSec. Managing Security at the Speed of Business. AlgoSec.com
AlgoSec Managing Security at the Speed of Business AlgoSec.com The AlgoSec Security Policy Management Suite As your data centers, networks and the security infrastructure that protects them continue to
More informationCorrigendum 3. Tender Number: 10/ dated
(A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial
More informationVMworld 2015 Track Names and Descriptions
VMworld 2015 Track Names and Descriptions Software- Defined Data Center Software- Defined Data Center General Pioneered by VMware and recognized as groundbreaking by the industry and analysts, the VMware
More information5 Steps to Government IT Modernization
5 Steps to Government IT Modernization 1 WHY MODERNIZE? IT modernization is intimidating, but it s necessary. What are the advantages of modernization? Enhance citizen experience and service delivery Lower
More informationEvolution of connectivity in the era of cloud
Evolution of connectivity in the era of cloud Phil Harris SVP and GM SP Market Vertical Riverbed Technology 1 2017 Riverbed Technology. All rights reserved. Transformational Services Span The Business
More information