F5
F5 Advanced Web Application Firewall Protection for Cyber Attacks

Perform real simulation with different types of attacks such as cross site scripting (XSS), credential stuffing, botnet, Layer 7 DDOS and demonstrate how F5 AWAF will be able to protect from those kind of attacks

Solution components: F5 BIG-IP AWAF, Hackazon Webserver and Attacking Tools.

Value proposition: Advanced WAF is built on proven F5 technology and goes beyond reactive security such as static signatures and reputation to proactively detect and mitigate bots, secure credentials and sensitive data, and defend against application denial-of-service (DoS).

Demo Time: 30 Min     

CTA Button
F5
F5 Access Policy Manager Integration (SSL VPN) with Third Party MFA

Perform SSL VPN via multi factor authentication (MFA) integration with Cisco Duo to verify user identify which include the options using mobile push and one time password to the mobile phone.

Solution components: F5 BIG-IP APM, Cisco Duo

Value proposition: F5 BIG-IP APM via DUO will help organizations deploy secure connectivity VPN attain zero trust protection for their workforce and resources. The joint solution enables organizations to easily deploy a seamless, robust zero trust experience for all users, regardless of location or type of user (employee, contractor, vendor, and so on).

Demo Time: 15 min 

CTA Button
F5
F5 DNS Traffic Optimization and Censorship

Perform DNS caching to improve user experience for internet browsing or accessing application also simulate unauthorized or illegal website by using DNS Response Policy Zone (RPZ) via NX Domain and Walled Garden.

Solution Components: F5 BIG-IP DNS

Value proposition: 

BIG-IP DNS delivers an intelligent DNS infrastructure that gives mobile users faster access and service response. This makes it easy for service providers (Telco) to optimize, monetize, and secure their DNS infrastructures.

Demo Time: 20 Min

CTA Button
F5
F5 Policy Enforcement Manager Bandwidth Control and Monitoring

Perform bandwidth control to limit the speed of connectivity when user accessing to internet or applications together with verifying and monitoring users' activities.

Solution Components: F5 PEM

Value proposition: Red Hat Ansible Automation Platform has become a game-changer for IBM Power customers. By enabling streamlined automation of common IT tasks—such as configuration management and application deployment—it liberates IT administrators' time and resources, allowing them to focus on more strategic initiatives

Demo Time: 15 min

CTA Button
Red Hat and F5
NGINX Enterprise Grade Ingress Controller on OpenShift

NGINX Ingress Controller is flexible, powerful, easy-to-use, and can be quickly deployed alongside the default OpenShift router to open up advanced security, resilience, and scalability. Ideal for all environments – from dev testing to production

Solution Components: NGINX CIS and Red Hat OpenShift​

Value proposition: NGINX Ingress Controller on Red Hat OpenShift provides organizations with a flexible, secure, scalable, and fully supported solution that helps them achieve more business outcomes while delivering tremendous and immediate value.

Demo Time: 20 Min

CTA Button
_IBM
Security Information and Event Management

Enable your security teams to face today’s threats proactively with advanced AI, powerful threat intelligence and access to cutting-edge content to maximize analyst potential. Showcase network threat analytics, user behaviour analytics and threat intelligence.

Solution Components: IBM Qradar SIEM

Value proposition: Enable your security analysts to quickly detect anomalies and attacks while eliminating many false positives. Evolve beyond traditional SIEM technology to “intelligent security analytics” by adding context and insights from capabilities such as deep packet inspection, asset and vulnerability management, cloud visibility, user behaviour analytics, and then applying advanced analytics including Watson AI.

Demo Time: 1 Hr

CTA Button
_IBM
Real-time Threat Detection and Response

QRadar EDR provides the ability to gain complete visibility over their endpoints, detecting and responding to threats autonomously without requiring additional highly skilled personnel.

Solution Components: IBM Qradar EDR

Value proposition: QRadar EDR delivers an innovative, AI-driven EDR platform that is capable of detecting cyber threats using dynamic behavioural analysis and allowing real-time and autonomous response.

Demo Time: 30 Min

CTA Button
_IBM
Attack Surface Management

Bring clarity to your cyber risk through the convergence of attack surface management (ASM) and continuous automated red teaming (CART).

Solution Components: IBM Randori Recon

Value proposition: Randori Recon is a security tool that enables a view of an organization’s internet facing IT assets from outside its perimeter. This includes known assets as well as shadow IT not previously monitored by the organization’s security professionals. This outside-in view shows what a hacker would see when scanning for potential entry points (i.e., the attack surface).

Demo Time: 30 Min

CTA Button
Tanium
Endpoint Management with Tanium – Patching of endpoints

Maintain up-to-date patches and updates on endpoints and close known risks.

Solution Components: Tanium virtual appliance, Tanium client running on Windows VM, Tanium client running on Linux VM – all virtual instances hosted on IBM cloud.

Value proposition: Tanium can be used for real-time visibility and patching of endpoints using the patch module, both manually as well as with automation with a patch deployment strategy that not only gets endpoints to 100% patch compliance but also drastically reduces the mean time to patch.

Demo Time: 30 Min

CTA Button
Tanium
Risk and Compliance Management with Tanium

Perform vulnerability and compliance assessments with Tanium on endpoints and perform real-time remediation.

Solution Components: Tanium virtual appliance, Tanium client running on Windows VM, Tanium client running on Linux VM – all virtual instances hosted on IBM cloud.

Value proposition: Create vulnerability and compliance assessments using Comply module in Tanium and demonstrate how the findings can be reviewed and also remediated with real-time patch installation thereby acting as a single solution that empowers security, compliance and operations teams in an organisation.

Demo Time: 30 Min

CTA Button

Let’s connect​

We’re here to help you navigate technology ecosystems, unlock opportunities and build and expand your practice.

Contact us to find out how Tech Data’s Centre of Excellence can help you scale faster and deliver an outstanding value to your customers. We can’t wait to be part of your growth journey!

Ivan Hec.

Ivan Hecimovic
Alliances Director
Tech Data

Daryn-Higgins

Daryn Higgins
Senior Solutions Architect
Tech Data