SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
Adaptive Access
                       p

                  Contextual Security for
               Application Delivery Networks
Peter Silva, Technical Marketing Manager - F5 Networks
Bill P db
     Podborney, Di of I f
                Dir f Information S
                             ti Security – Alli t Credit U i
                                      it   Alliant C dit Union
Adaptive Access
     p

      Behavioral Based
   Contextual Security for
Application Delivery Networks
Defense in Depth:
                  A Heretic Speaks
• Problems with DiD
  –   “Slow Down” means Latency
  –   Increased Complexity
  –   Inefficient use of Resources
  –   Improperly Deployed


• Real World Impact
  – Slows New Technology Adoption
  – Not Easily Extensible
  – No Mandate for Integration
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networks

Más contenido relacionado

La actualidad más candente

Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Dragos, Inc.
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point FinalBen Rothke
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceIvanti
 
Chris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert CommunicationsChris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert Communicationscentralohioissa
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionmoldovaictsummit2016
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologiesDavid Strom
 
Dragos 2019 ICS Year in Review
Dragos 2019 ICS Year in ReviewDragos 2019 ICS Year in Review
Dragos 2019 ICS Year in ReviewDragos, Inc.
 
Cloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research SummaryCloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research SummaryIntel IT Center
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
 
Is talent shortage ws marco morana
Is talent shortage ws marco moranaIs talent shortage ws marco morana
Is talent shortage ws marco moranaMarco Morana
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!centralohioissa
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingThinAir
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directorscentralohioissa
 
2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity GroupsDragos, Inc.
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Building secure mobile apps
Building secure mobile appsBuilding secure mobile apps
Building secure mobile appsMartin Vigo
 

La actualidad más candente (20)

Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch Intelligence
 
Chris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert CommunicationsChris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert Communications
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
Dragos 2019 ICS Year in Review
Dragos 2019 ICS Year in ReviewDragos 2019 ICS Year in Review
Dragos 2019 ICS Year in Review
 
Cloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research SummaryCloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research Summary
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
Is talent shortage ws marco morana
Is talent shortage ws marco moranaIs talent shortage ws marco morana
Is talent shortage ws marco morana
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Building secure mobile apps
Building secure mobile appsBuilding secure mobile apps
Building secure mobile apps
 

Destacado

Deploying Wireless Across The Enterprise: Mobile Strategies for IT
Deploying Wireless Across The Enterprise: Mobile Strategies for ITDeploying Wireless Across The Enterprise: Mobile Strategies for IT
Deploying Wireless Across The Enterprise: Mobile Strategies for ITdigitallibrary
 
IP Issues in Open Source: What Vendors and IT Buyers Need to Know
IP Issues in Open Source: What Vendors and IT Buyers Need to KnowIP Issues in Open Source: What Vendors and IT Buyers Need to Know
IP Issues in Open Source: What Vendors and IT Buyers Need to Knowdigitallibrary
 
VoIP Wired, Wireless, Everywhere� An enterprise perspective
VoIP Wired, Wireless, Everywhere� An enterprise perspectiveVoIP Wired, Wireless, Everywhere� An enterprise perspective
VoIP Wired, Wireless, Everywhere� An enterprise perspectivedigitallibrary
 
FAN - An Architecture for Data Management
FAN - An Architecture for Data ManagementFAN - An Architecture for Data Management
FAN - An Architecture for Data Managementdigitallibrary
 
Architectures for IP Telephony Deployment
Architectures for IP Telephony DeploymentArchitectures for IP Telephony Deployment
Architectures for IP Telephony Deploymentdigitallibrary
 
The Phantom Menace - Security
The Phantom Menace - SecurityThe Phantom Menace - Security
The Phantom Menace - Securitydigitallibrary
 
Virtualized Data Centers
Virtualized Data CentersVirtualized Data Centers
Virtualized Data Centersdigitallibrary
 
Wi-Fi�: Next Generation WLANs for Next-Generation Applications
Wi-Fi�: Next Generation WLANs for Next-Generation ApplicationsWi-Fi�: Next Generation WLANs for Next-Generation Applications
Wi-Fi�: Next Generation WLANs for Next-Generation Applicationsdigitallibrary
 
Reading Your Buyer's Digital Body Language: Online Marketing in a Difficult E...
Reading Your Buyer's Digital Body Language: Online Marketing in a Difficult E...Reading Your Buyer's Digital Body Language: Online Marketing in a Difficult E...
Reading Your Buyer's Digital Body Language: Online Marketing in a Difficult E...digitallibrary
 
The Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware TechnologiesThe Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware Technologiesdigitallibrary
 
Data Center 3.0 Infrastructure Transformation
Data Center 3.0 Infrastructure TransformationData Center 3.0 Infrastructure Transformation
Data Center 3.0 Infrastructure Transformationdigitallibrary
 

Destacado (11)

Deploying Wireless Across The Enterprise: Mobile Strategies for IT
Deploying Wireless Across The Enterprise: Mobile Strategies for ITDeploying Wireless Across The Enterprise: Mobile Strategies for IT
Deploying Wireless Across The Enterprise: Mobile Strategies for IT
 
IP Issues in Open Source: What Vendors and IT Buyers Need to Know
IP Issues in Open Source: What Vendors and IT Buyers Need to KnowIP Issues in Open Source: What Vendors and IT Buyers Need to Know
IP Issues in Open Source: What Vendors and IT Buyers Need to Know
 
VoIP Wired, Wireless, Everywhere� An enterprise perspective
VoIP Wired, Wireless, Everywhere� An enterprise perspectiveVoIP Wired, Wireless, Everywhere� An enterprise perspective
VoIP Wired, Wireless, Everywhere� An enterprise perspective
 
FAN - An Architecture for Data Management
FAN - An Architecture for Data ManagementFAN - An Architecture for Data Management
FAN - An Architecture for Data Management
 
Architectures for IP Telephony Deployment
Architectures for IP Telephony DeploymentArchitectures for IP Telephony Deployment
Architectures for IP Telephony Deployment
 
The Phantom Menace - Security
The Phantom Menace - SecurityThe Phantom Menace - Security
The Phantom Menace - Security
 
Virtualized Data Centers
Virtualized Data CentersVirtualized Data Centers
Virtualized Data Centers
 
Wi-Fi�: Next Generation WLANs for Next-Generation Applications
Wi-Fi�: Next Generation WLANs for Next-Generation ApplicationsWi-Fi�: Next Generation WLANs for Next-Generation Applications
Wi-Fi�: Next Generation WLANs for Next-Generation Applications
 
Reading Your Buyer's Digital Body Language: Online Marketing in a Difficult E...
Reading Your Buyer's Digital Body Language: Online Marketing in a Difficult E...Reading Your Buyer's Digital Body Language: Online Marketing in a Difficult E...
Reading Your Buyer's Digital Body Language: Online Marketing in a Difficult E...
 
The Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware TechnologiesThe Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware Technologies
 
Data Center 3.0 Infrastructure Transformation
Data Center 3.0 Infrastructure TransformationData Center 3.0 Infrastructure Transformation
Data Center 3.0 Infrastructure Transformation
 

Similar a Adaptive Access Contextual Security for Application Delivery Networks

PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudVincent Kwon
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoHP Enterprise Italia
 
Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012Imperva
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010graywilliams
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2fphart
 
Modern Lessons in Security Monitoring
Modern Lessons in Security MonitoringModern Lessons in Security Monitoring
Modern Lessons in Security MonitoringAnton Goncharov
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityInnoTech
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...TechSoup
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud DeploymentOpen Data Center Alliance
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 

Similar a Adaptive Access Contextual Security for Application Delivery Networks (20)

PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the Cloud
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2
 
Modern Lessons in Security Monitoring
Modern Lessons in Security MonitoringModern Lessons in Security Monitoring
Modern Lessons in Security Monitoring
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 

Más de digitallibrary

SOA: State of the Union
SOA: State of the UnionSOA: State of the Union
SOA: State of the Uniondigitallibrary
 
How to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on TrackHow to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on Trackdigitallibrary
 
Physical Security & IT
Physical Security & ITPhysical Security & IT
Physical Security & ITdigitallibrary
 
Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?digitallibrary
 
How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...digitallibrary
 
10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Vision10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Visiondigitallibrary
 
Virtualization and WAN Optimization
Virtualization and WAN OptimizationVirtualization and WAN Optimization
Virtualization and WAN Optimizationdigitallibrary
 
The Industrialisation of Software Development
The Industrialisation of Software DevelopmentThe Industrialisation of Software Development
The Industrialisation of Software Developmentdigitallibrary
 
Software 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaSSoftware 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaSdigitallibrary
 
The Open Source & SaaS Revolution
The Open Source & SaaS RevolutionThe Open Source & SaaS Revolution
The Open Source & SaaS Revolutiondigitallibrary
 
Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,digitallibrary
 
Lost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendorLost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendordigitallibrary
 
The On-Demand Project Execution Company
The On-Demand Project Execution CompanyThe On-Demand Project Execution Company
The On-Demand Project Execution Companydigitallibrary
 
Outsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software ProductsOutsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software Productsdigitallibrary
 
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...digitallibrary
 
Greening the Data Center: The IT Industry's Energy Efficiency Imperative
Greening the Data Center: The IT Industry's Energy Efficiency ImperativeGreening the Data Center: The IT Industry's Energy Efficiency Imperative
Greening the Data Center: The IT Industry's Energy Efficiency Imperativedigitallibrary
 
Virtual Desktop Architecture
Virtual Desktop ArchitectureVirtual Desktop Architecture
Virtual Desktop Architecturedigitallibrary
 
RSS: Communication, for the Enterprise
RSS: Communication, for the EnterpriseRSS: Communication, for the Enterprise
RSS: Communication, for the Enterprisedigitallibrary
 
Enterprise Wi-Fi Network Management: Issues and Best Practices
Enterprise Wi-Fi Network Management: Issues and Best PracticesEnterprise Wi-Fi Network Management: Issues and Best Practices
Enterprise Wi-Fi Network Management: Issues and Best Practicesdigitallibrary
 
Seven Rules for Kick-Ass Market Positioning
Seven Rules for Kick-Ass Market PositioningSeven Rules for Kick-Ass Market Positioning
Seven Rules for Kick-Ass Market Positioningdigitallibrary
 

Más de digitallibrary (20)

SOA: State of the Union
SOA: State of the UnionSOA: State of the Union
SOA: State of the Union
 
How to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on TrackHow to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on Track
 
Physical Security & IT
Physical Security & ITPhysical Security & IT
Physical Security & IT
 
Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?
 
How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...
 
10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Vision10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Vision
 
Virtualization and WAN Optimization
Virtualization and WAN OptimizationVirtualization and WAN Optimization
Virtualization and WAN Optimization
 
The Industrialisation of Software Development
The Industrialisation of Software DevelopmentThe Industrialisation of Software Development
The Industrialisation of Software Development
 
Software 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaSSoftware 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaS
 
The Open Source & SaaS Revolution
The Open Source & SaaS RevolutionThe Open Source & SaaS Revolution
The Open Source & SaaS Revolution
 
Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,
 
Lost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendorLost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendor
 
The On-Demand Project Execution Company
The On-Demand Project Execution CompanyThe On-Demand Project Execution Company
The On-Demand Project Execution Company
 
Outsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software ProductsOutsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software Products
 
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
 
Greening the Data Center: The IT Industry's Energy Efficiency Imperative
Greening the Data Center: The IT Industry's Energy Efficiency ImperativeGreening the Data Center: The IT Industry's Energy Efficiency Imperative
Greening the Data Center: The IT Industry's Energy Efficiency Imperative
 
Virtual Desktop Architecture
Virtual Desktop ArchitectureVirtual Desktop Architecture
Virtual Desktop Architecture
 
RSS: Communication, for the Enterprise
RSS: Communication, for the EnterpriseRSS: Communication, for the Enterprise
RSS: Communication, for the Enterprise
 
Enterprise Wi-Fi Network Management: Issues and Best Practices
Enterprise Wi-Fi Network Management: Issues and Best PracticesEnterprise Wi-Fi Network Management: Issues and Best Practices
Enterprise Wi-Fi Network Management: Issues and Best Practices
 
Seven Rules for Kick-Ass Market Positioning
Seven Rules for Kick-Ass Market PositioningSeven Rules for Kick-Ass Market Positioning
Seven Rules for Kick-Ass Market Positioning
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Adaptive Access Contextual Security for Application Delivery Networks

  • 1. Adaptive Access p Contextual Security for Application Delivery Networks Peter Silva, Technical Marketing Manager - F5 Networks Bill P db Podborney, Di of I f Dir f Information S ti Security – Alli t Credit U i it Alliant C dit Union
  • 2. Adaptive Access p Behavioral Based Contextual Security for Application Delivery Networks
  • 3. Defense in Depth: A Heretic Speaks • Problems with DiD – “Slow Down” means Latency – Increased Complexity – Inefficient use of Resources – Improperly Deployed • Real World Impact – Slows New Technology Adoption – Not Easily Extensible – No Mandate for Integration