Tech-Datas-Centre-of-Excellence

Security

IT security protects the integrity of information technologies like computer systems, networks, and data from attack, damage, or unauthorized access.

 

 

F5

CoE CODE : SE-M01

F5 Advanced Web Application Firewall Protection for Cyber Attacks

Perform real simulation with different types of attacks such as cross site scripting (XSS), credential stuffing, botnet, Layer 7 DDOS and demonstrate how F5 AWAF will be able to protect from those kind of attacks

 

Solution Components

F5 BIG-IP AWAF, Hackazon Webserver and Attacking Tools.

Value Proposition

Advanced WAF is built on proven F5 technology and goes beyond reactive security such as static signatures and reputation to proactively detect and mitigate bots, secure credentials and sensitive data, and defend against application denial-of-service (DoS).

Demo Time

30 min

Book Demo

akyoung@au1.ibm.com_IBM_D_Mark_Blue80_RGB

CoE CODE :SE-S07

Security Operation Center (SOC) with Security Orchestration Automation and Response (SOAR)

A modern virtual SOC to enable security team on monitoring, manage and response to security incident.  Aligning SOC and SOAR to accelerate response times and reduce analyst workload.

Solution Components

IBM QRadar, IBM Resilient SOAR

Value Proposition

By integrating the IBM Resilient with IBM QRadar Security Intelligence, security teams are able to build out a market leading threat management solution that covers the detection, investigation and remediation of threats across a wide range of cyber use cases. The  technology integration allows security analysts to quickly and efficiently escalate suspected offenses from QRadar to Resilient, trigger  automated enrichments and drive the full investigation process.

Demo Time

1 hour

Book Demo

akyoung@au1.ibm.com_IBM_D_Mark_Blue80_RGB

CoE CODE : SE-A18

Connected security for a hybrid, Multicloud world – IBM Cloud Pak for Security 

IBM Cloud Pak for Security is an open security platform that connects to your existing data sources to generate deeper insights and enables you to act faster with automation. Uncover hidden threats and make more informed risk-based decisions.

Solution Components

IBM Cloud Pak for Security

Value Proposition

Whether your data resides on IBM or third-party tools, on-premises or multiple cloud environments, IBM Cloud Pak for Security helps you to find and respond to threats and risks — all while leaving your data where it is.

Demo Time

45 mins

Book Demo

F5

CoE CODE :SE-M02

F5 Access Policy Manager Integration (SSL VPN) with Third Party MFA

Perform SSL VPN via multi factor authentication (MFA) integration with Cisco Duo to verify user identify which include the options using mobile push and one time password to the mobile phone.

 

Solution Components

F5 BIG-IP APM, Cisco Duo

Value Proposition

F5 BIG-IP APM via DUO will help organizations deploy secure connectivity VPN attain zero trust protection for their workforce and resources. The joint solution enables organizations to easily deploy a seamless, robust zero trust experience for all users, regardless of location or type of user (employee, contractor, vendor, and so on).

Demo Time

15 min

Book Demo

F5-1

CoE CODE : SE-S31

NGINX Enterprise Grade Ingress Controller on OpenShift

NGINX Ingress Controller is flexible, powerful, easy-to-use, and can be quickly deployed alongside the default OpenShift router to open up advanced security, resilience, and scalability. Ideal for all environments – from dev testing to production

Solution Components

NGINX CIS and Red Hat OpenShift​

Value Proposition

NGINX Ingress Controller on Red Hat OpenShift provides organizations with a flexible, secure, scalable, and fully supported solution that helps them achieve more business outcomes while delivering tremendous and immediate value

Demo Time

20 mins

Book Demo

F5

CoE CODE :SE-M03

F5 DNS Traffic Optimization and Censorship

Perform DNS caching to improve user experience for internet browsing or accessing application also simulate unauthorized or ilegal website by using DNS Response Policy Zone (RPZ) via NX Domain and Walled Garden

Solution Components

F5 BIG-IP DNS

Value Proposition

BIG-IP DNS delivers an intelligent DNS infrastructure that gives mobile users faster access and service response. This makes it easy for service providers (Telco) to optimize, monetize, and secure their DNS infrastructures

Demo Time

20 min

Book Demo

F5-1

CoE CODE : SE-S32

Effectively Load balance the legacy and modern apps with NGINX

NGINX and Red Hat Enterprise Linux (RHEL) are excellent choices for organizations with stringent security and compliance needs that help organizations successfully deliver legacy and modern apps in any environment avoiding costly infrastructure lock‑in.

Solution Components

NGINX Load balancer and Red Hat Enterprise Linux

Value Proposition

NGINX sitting on top web and application servers as a Layer 7 load balancer increases the web application's efficiency, reliability, and performance.

Demo Time

15 mins

Book Demo

F5-1

CoE CODE : SE-M29

F5 Policy Enforcement Manager Bandwidth Control and Monitoring

Perform bandwidth control to limit the speed of connectivity when user accessing to internet or applications together with verifying and monitoring users' activities.

Solution Components

F5 PEM

Value Proposition

F5 PEM can help to implement services based on subscriber level, according to plan, location, and device. In addition to recognizing who should access what and when, you’ll be able to gather data with network visibility. Create relevant plan tiers and offer new, over-the-top services based on user behavior patterns

Demo Time

15 mins

Book Demo

F5-1

CoE CODE : SE-I12

Intelligent Layer 7 DoS and Brute Force Protection for Web Applications

F5 ASM & LTM, which resides between applications and users, can detect and protect against a layer 7 attack in real-time using advance WAF 

Solution Components

F5 ASM (AWAF), LTM, MS Azure

Value Proposition

F5 BIG-IP ASM offers an all-in-one solution for protecting applications and organizations from attacks like (DDOS, SQL-injection,  cross-site scripting etc.) & help customers access their applications securely irrespective to their location.

Demo Time

60 mins

Book Demo

BOOK A DEMO