?

F5 | WWT | DISA & Mission Partner - Virtual Tech Session

F5 | WWT | DISA & Mission Partner - Virtual Tech Session

Wednesday, June 10, 2020

11:00 am - 2:00 pm ET

Registration Is Closed

If you would still like to be included in this event, please email caitlin.reedy@wwt.com.

What You'll Learn

This session will focus on three different DoD use cases – Privileged User Access (PUA), SSL Break & Inspect and Orchestration (SSLO) and F5’s Automation Orchestration Tool Chain.

PUA

SSH and Web management interfaces for routers, switches, secure telephony administration interfaces, firewall, IDS/IPS, DLP interfaces, storage array interfaces, VDI, and more, can be CAC/PIV/Smart Card enabled using F5 Privileged User Authentication (PUA). Learn how the F5 PUA provides Single Sign On (SSO) to all administration interfaces, infrastructure devices, and applications:

  • How the F5 PUA solution creates an ephemeral authentication, closed circuit one-time password, allowing for secure CAC/PIV/Smart Card multi-factor authentication to any system
  • How the F5 PUA acts as a policy manager to CAC/PIV/Smart Card enable administrative access to network elements to include routers, firewalls, IDS, IPS, TAPS, and all other out of band network resources that are vulnerable to credential stuffing
  • How the F5 PUA solution eliminates the need to have admin rights on each device, extending the PKI for admin access with CAC/PIV/Smart Card enable access to OOB devices using ephemeral authentication
  • How privileged access rights can be quickly removed and tied back to the CAC/PIV/Smart Card access rights
SSLO

As the number of applications and volume of data continues to grow, so too grows the percentage of applications using Secure Socket Layer (SSL) and Transport Layer Security (TLS) solutions to encrypt data in transit. According to Google's HTTPS encryption transparency report, 73 percent of pages loaded in the US using Chrome on Windows used HTTPS, up from 59 percent a year ago. 

This is a great win for security overall to help prevent data breaches, however, cyber criminals are using these encrypted channels to propagate malware and exfiltrate data knowing they can bypass traditional security inspection solutions that don't have visibility of the encrypted traffic.

In this portion of the tech session, you will learn how SSL Orchestrator maximizes visibility, infrastructure efficiencies, and security by cost-effectively inspecting all inbound and outbound encrypted traffic, supporting multiple deployment modes and easily integrating with complex architectures for optimal flexibility.

F5’s Automation Orchestration Toolchain

When NetOps and SecOps teams do not (or are unable to) participate in automated application delivery processes, applications can be released without adequate security or traffic management controls. The result? Poor user experiences and increased business risk as well as significant challenges with post-release management and operability. But it doesn’t have to be this way.

Rapid provisioning of scalable services through declarative APIs or service catalogs gives the SecOps and NetOps teams the tools they need to protect the application and maintain compliance without adding friction to the software delivery life cycle. Changing manual processes into automated ones helps NetOps and SecOps teams manage thousands of instances and apps at scale.

But how do you get started with automation? During this tech session, we’ll show how the F5 Automation Toolchain makes it faster and easier to deploy and configure F5 application services via declarative interfaces and introduce you to training to help you expand your skills.

What you'll learn:

  •  How the F5 Automation Toolchain can help you automate configuration & deployment easily
  • How to use the components of the Automation Toolchain to efficiently provision, configure, and manage the services that support your apps
  • How to empower DevOps with declarative technology, orchestration integration, cloud templates and more