1 of 5 01.07.2014 18:59 Technical and Breakouts Session Time Session Focus Title and Overview Speaker Synthesis Technical overview of SDAS and F5's Reference Architectures Steve Allie Technical overview of Synthesis, Software Defined Application Services and F5's, and Mobility Reference Architectures Multi Layer DDoS Mitigation - The 269 new Mitigation Details in the DDoS Protection Reference Architecture Joakim Sunberg Distributed Denial-of-Service attacks are top of mind for organisations in 2014. Attackers are exploiting amplification techniques for volumetric attacks while also increasing the sophistication of their application level attacks. Organisations must focus on designing the right DDoS protection architecture to effectively mitigate sophisticated multi-layer attacks. In this session you will learn how the right architecture can mitigate modern DDoS attacks, from ICMP fragmentation grenades to the latest in SSL brute force key exchange attacks. We ll also review some key customer tools including a DDoS Best Practices guide and the DDoS Survival Handbook which provide critical guidance to simplify and ensure successful deployment of your architecture. Enterprise / Core Scale your DNS Infrastructure to Ensure App and Service Availability Nigel Ashworth DNS traffic has grown over 100% in the last 5 years. This increase in volume is largely attributed to the rollout of new services and applications to support the growing mobile lifestyle. In order to meet growing DNS demands, organisations often increase DNS capacity by adding more servers, in turn increasing costs. DNS also continues to be a target for attacks, degrading DNS performance, causing outages or worse, directing browsers/visitors to malicious impersonators. Learn how to architect intelligent DNS solutions that helps scale your DNS infrastructure, improve performance, mitigate attacks, and reduce data centre costs. / Core F5 Management Solution - BIG-IQ Technical Deep Dive Nicolas Menant A key pillar of F5 s Synthesis architecture, BIG-IQ is an intelligent framework for managing and orchestrating the delivery of application services both locally and in public and private clouds. With a live demo, you ll see how BIG-IQ manages and orchestrates application delivery and how you can manage BIG-IP devices across your enterprise. Orchestration of application delivery in Amazon AWS, OpenStack and VMware NSX will be covered, as will management of F5 s ASM and AFM security devices. Open Stack, SDN Christian Koenning This session looks at OpenStack - a popular choice to manage compute, storage, and networking resources in private and public cloud environments in the service provider environment. With F5 s focus on development of Layer 4-7 application services to augment existing SDN solutions, attend to see an overview of how F5 integrates with these technologies and architectures. Migration / Bursting / Orchestration Gary Newe / Vincent Lavergne Successful cloud computing depends on integrating application services across data centres seamlessly without impact to user experience. F5 s Migration solution does this and more, optimising application delivery services across traditional and cloud architectures. Join us for a technical review on how F5's Migration solution automates and orchestrates the deployment of application delivery services across both traditional and cloud infrastructures. Whether an organisation is adopting a public, private, or hybrid cloud, F5 simplifies the optimisation of business applications, ensuring that they re fast, secure, and available wherever they are. Find out how BIG-IQ integrates with existing cloud management and orchestration engines to streamline overall application deployment. See the demo on how F5's iapps Templates and self-service model can rapidly provision application delivery services, enabling new applications to be made available to users in minutes instead of weeks. Prevent Application and Malware attacks with F5 WebSafe and Mobilesafe Alfredo Vistola This session examines WebSafe s ability to detect web fraud by monitoring the integrity of the session data that the application expects to see between itself and the browser. This method isn t vulnerable to zero-day threats: malware variants, new proxy/masking techniques, or fraudulent activity originating from devices, locations or users who haven t yet accumulated digital fraud fingerprints. VMware and F5 - Joint Solution VMware and F5 - Technical Solution Michael Koyfman / Garry Owen, VMware F5 s and VMware have a strategic alliance around VDI and End User computing. In this session we will cover how F5 integrates in to the VMware infrastructure and the benefits of deploying F5 s application services.
2 of 5 01.07.2014 18:59 Programmability(T): icall, icontrol, irules use cases, on-demand TMOS Deep Dive - The Secrets to Customisation and Automation Get the most out of your BIG-IP with the near limitless capabilities of our programmable APIs. In this advanced sessions F5 experts will guide you through getting the most out of your F5 device s programmatic features. Tools, tips, tricks of the trade and more will all be covered along with some advanced examples of irules, icontrol REST and iapps, as well as a healthy focus on Q&A. Bring your questions, problems to solve and curiosity, and learn just how far you can go with F5 s APIs. Philippe Cloup / Aaron Hooley GI Consolidation - Streamline to Save Money and Enhance Network Quality Bart Salaets Many vendors sell point products that meet specific functional requirements but contribute to device sprawl in the S/Gi network. The F5 solution offers a unified framework that delivers critical network services with massive scalability and performance, along with significant flexibility, extensibility, and NFV-readiness. Join F5's SP Solution Architect and learn how you can deploy fewer servers, simplify your network, and increase network availability with less risk of point product failures that can take down your entire S/Gi network. Cisco and F5 - Joint Solution Cisco ACI/VMDC Nicolas Menant / Cisco Solution Architect Cisco is pushing the Application Centric Infrastructure (ACI) and the Virtualized Multiservice Data Centre (VMDC). In this session, learn how F5 integrates into the ACI automation framework to deliver software defined application services. Multi Layer DDoS Mitigation - The 269 new Mitigation Details in the DDoS Protection Reference Architecture Joakim Sundberg Distributed Denial-of-Service attacks are top of mind for organisations in 2014. Attackers are exploiting amplification techniques for volumetric attacks while also increasing the sophistication of their application level attacks. Organisations must focus on designing the right DDoS protection architecture to effectively mitigate sophisticated multi-layer attacks. In this session you will learn how the right architecture can mitigate modern DDoS attacks, from ICMP fragmentation grenades to the latest in SSL brute force key exchange attacks. We ll also review some key customer tools including a DDoS Best Practices guide and the DDoS Survival Handbook which provide critical guidance to simplify and ensure successful deployment of your architecture. Protect your internal users on the Internet with Secure Web Gateway Users need to use the Internet to do their jobs, but unfettered access opens up exposure to web-based threats, malware, misuse and lower productivity. This session examines how SWG s explicit proxy, URL filtering, and application delivery functions - on one platform means a simpler network, less management, and safer Internet access. Rich Bible Migration / Bursting / Orchestration Gary Newe / Vincent Lavergne Successful cloud computing depends on integrating application services across data centres seamlessly without impact to user experience. F5 s Migration solution does this and more, optimising application delivery services across traditional and cloud architectures. Join us for a technical review on how F5's Migration solution automates and orchestrates the deployment of application delivery services across both traditional and cloud infrastructures. Whether an organisation is adopting a public, private, or hybrid cloud, F5 simplifies the optimisation of business applications, ensuring that they re fast, secure, and available wherever they are. Find out how BIG-IQ integrates with existing cloud management and orchestration engines to streamline overall application deployment. See the demo on how F5's iapps Templates and self-service model can rapidly provision application delivery services, enabling new applications to be made available to users in minutes instead of weeks. Traffic Steering / PEM - Monetise your Data Traffic with Context Awareness Bart Salaets With a wide range of policy enforcement capabilities, F5 s Policy Enforcement Manager (PEM) delivers the insight you need to understand subscriber behaviour and effectively manage and control your subscribers' traffic streams. PEM provides the ability to inspect application content and enforce policies based on user or system defined criteria. Policies may rate-limit, drop, DSCP/TOS mark, and intelligently steer subscriber flows to value added services platforms to deliver new revenue models and optimise utilisation of VAS systems. Understand how intelligent service chaining can be achieved, with a seamless evolution to an NFV/SDN architecture, and discover how PEM can be utilised to provide the foundation for a flexible and dynamic model to enhance subscribers' data experience while increasing revenue from previously hard to deliver services. Enterprise / Core Scale your DNS Infrastructure to Ensure App and Service Availability Nigel Ashworth DNS traffic has grown over 100% in the last 5 years. This increase in volume is largely attributed to the rollout of new services and applications to support the growing mobile lifestyle. In order to meet growing DNS demands, organisations often increase DNS capacity by adding more servers, in turn increasing costs. DNS also continues to be a target for attacks, degrading DNS performance, causing outages or worse, directing browsers/visitors to malicious impersonators. Learn how to architect intelligent DNS solutions that helps scale your DNS infrastructure, improve
3 of 5 01.07.2014 18:59 performance, mitigate attacks, and reduce data centre costs. Core / F5 Management Solution - BIG-IQ Technical Deep Dive Nicolas Menant A key pillar of F5 s Synthesis architecture, BIG-IQ is an intelligent framework for managing and orchestrating the delivery of application services both locally and in public and private clouds. With a live demo, you ll see how BIG-IQ manages and orchestrates application delivery and how you can manage BIG-IP devices across your enterprise. Orchestration of application delivery in Amazon AWS, OpenStack and VMware NSX will be covered, as will management of F5 s ASM and AFM security devices. Protect Your Internal Users on the Internet with Secure Web Gateway Richard Bible Users need to use the Internet to do their jobs, but unfettered access opens up exposure to web-based threats, malware, misuse and lower productivity. This session examines how SWG s explicit proxy, URL filtering, and application delivery functions - on one platform means a simpler network, less management, and safer Internet access. Federation / SAML Michael Koyfman With support for SAML 2.0, F5 now offers improved single sign-on (SSO) capabilities for web-based, VDI, and client/server applications whether hosted in corporate data centres or the cloud. In addition, this session will cover how BIG-IP APM offers identity federation across multiple product instances within an organisation, reducing the number of passwords needed by users to access corporate applications. Optimising TCP in today s changing network environment Philippe Cloup The need to juggle performance across wired, wireless and Wi-Fi networks is a challenge as each of these paths has very different characteristics when it comes to TCP. Tuning the TCP stack to be optimized for the varying degrees of packet loss, latency and congestion on the different connection types is a challenge. This session will cover tuning several aspects of your network and the underlying TCP stack to deliver an optimized application experience for all users. Topics will include: Choosing the correct Congestion Control algorithm Optimizing TCP with techniques like TCP buffering and adjusting TCP window sizes Rate-based pacing to help multiple request/responses over a single connection Multipath TCP to automatically work around failures by leveraging Wi-Fi and 3G Programmability(T): icall, icontrol, irules use cases, on-demand TMOS Deep Dive -The Secrets to Customisation and Automation Get the most out of your BIG-IP with the near limitless capabilities of our programmable APIs. In this advanced sessions F5 experts will guide you through getting the most out of your F5 device s programmatic features. Tools, tips, tricks of the trade and more will all be covered along with some advanced examples of irules, icontrol REST and iapps, as well as a healthy focus on Q&A. Bring your questions, problems to solve and curiosity, and learn just how far you can go with F5 s APIs. Philippe Cloup / Aaron Hooley Federation / SAML Michael Koyfman With support for SAML 2.0, F5 now offers improved single sign-on (SSO) capabilities for web-based, VDI, and client/server applications whether hosted in corporate data centres or the cloud. In addition, this session will cover how BIG-IP APM offers identity federation across multiple product instances within an organisation, reducing the number of passwords needed by users to access corporate applications. OpenStack, SDN Christian Koenning OpenStack continues to be a popular choice for organisations to manage compute, storage, and networking resources in private and public cloud environments. With F5 s focus on development of Layer 4-7 application services to augment existing SDN solutions, this session provides an overview of how F5 integrates with these technologies and architectures. Prevent Application and Malware attacks with F5 WebSafe and MobileSafe Alfredo Vistola This session examines WebSafe s ability to detect web fraud by monitoring the integrity of the session data that the application expects to see between itself and the browser. This method isn t vulnerable to zero-day threats: malware variants, new proxy/masking techniques, or fraudulent activity originating from devices, locations or users who haven t yet accumulated digital fraud fingerprints. LTE Roaming / DRA / Traffix Peter Nas As 4G LTE deployments are happening across the region, communication service providers must manage the growing volume and complexity of diameter signalling among many new network
4 of 5 01.07.2014 18:59 elements. This session explores how LTE network rollout can be made far more scalable using a centralised Diameter routing platform. The F5 Traffix Signalling Delivery Controller (SDC) manages Diameter signalling to ensure top performance and reliability so you can scale to support an unlimited number of subscribers. You ll learn how to implement policy and charging rules and enforcement; enable network roaming; optimize online and offline charging with multiple vendors; and connect legacy and LTE systems. You ll also hear how SDC can play an important role in the upcoming 2014 EU Data Roaming regulations. F5 Networks 2014
5 of 5 01.07.2014 18:59