Security
IT security protects the integrity of information technologies like computer systems, networks, and data from attack, damage, or unauthorized access.
CoE CODE : SE-M01
F5 Advanced Web Application Firewall Protection for Cyber Attacks
Perform real simulation with different types of attacks such as cross site scripting (XSS), credential stuffing, botnet, Layer 7 DDOS and demonstrate how F5 AWAF will be able to protect from those kind of attacks
Solution Components
F5 BIG-IP AWAF, Hackazon Webserver and Attacking Tools.
Value Proposition
Advanced WAF is built on proven F5 technology and goes beyond reactive security such as static signatures and reputation to proactively detect and mitigate bots, secure credentials and sensitive data, and defend against application denial-of-service (DoS).
Demo Time
30 min
CoE CODE :SE-S07
Security Operation Center (SOC) with Security Orchestration Automation and Response (SOAR)
A modern virtual SOC to enable security team on monitoring, manage and response to security incident. Aligning SOC and SOAR to accelerate response times and reduce analyst workload.
Solution Components
IBM QRadar, IBM Resilient SOAR
Value Proposition
By integrating the IBM Resilient with IBM QRadar Security Intelligence, security teams are able to build out a market leading threat management solution that covers the detection, investigation and remediation of threats across a wide range of cyber use cases. The technology integration allows security analysts to quickly and efficiently escalate suspected offenses from QRadar to Resilient, trigger automated enrichments and drive the full investigation process.
Demo Time
1 hour
CoE CODE : SE-A18
Connected security for a hybrid, Multicloud world – IBM Cloud Pak for Security
IBM Cloud Pak for Security is an open security platform that connects to your existing data sources to generate deeper insights and enables you to act faster with automation. Uncover hidden threats and make more informed risk-based decisions.
Solution Components
IBM Cloud Pak for Security
Value Proposition
Whether your data resides on IBM or third-party tools, on-premises or multiple cloud environments, IBM Cloud Pak for Security helps you to find and respond to threats and risks — all while leaving your data where it is.
Demo Time
45 mins
CoE CODE :SE-M02
F5 Access Policy Manager Integration (SSL VPN) with Third Party MFA
Perform SSL VPN via multi factor authentication (MFA) integration with Cisco Duo to verify user identify which include the options using mobile push and one time password to the mobile phone.
Solution Components
F5 BIG-IP APM, Cisco Duo
Value Proposition
F5 BIG-IP APM via DUO will help organizations deploy secure connectivity VPN attain zero trust protection for their workforce and resources. The joint solution enables organizations to easily deploy a seamless, robust zero trust experience for all users, regardless of location or type of user (employee, contractor, vendor, and so on).
Demo Time
15 min
CoE CODE : SE-S31
NGINX Enterprise Grade Ingress Controller on OpenShift
NGINX Ingress Controller is flexible, powerful, easy-to-use, and can be quickly deployed alongside the default OpenShift router to open up advanced security, resilience, and scalability. Ideal for all environments – from dev testing to production
Solution Components
NGINX CIS and Red Hat OpenShift
Value Proposition
NGINX Ingress Controller on Red Hat OpenShift provides organizations with a flexible, secure, scalable, and fully supported solution that helps them achieve more business outcomes while delivering tremendous and immediate value
Demo Time
20 mins
CoE CODE :SE-M03
F5 DNS Traffic Optimization and Censorship
Perform DNS caching to improve user experience for internet browsing or accessing application also simulate unauthorized or ilegal website by using DNS Response Policy Zone (RPZ) via NX Domain and Walled Garden
Solution Components
F5 BIG-IP DNS
Value Proposition
BIG-IP DNS delivers an intelligent DNS infrastructure that gives mobile users faster access and service response. This makes it easy for service providers (Telco) to optimize, monetize, and secure their DNS infrastructures
Demo Time
20 min
CoE CODE : SE-S32
Effectively Load balance the legacy and modern apps with NGINX
NGINX and Red Hat Enterprise Linux (RHEL) are excellent choices for organizations with stringent security and compliance needs that help organizations successfully deliver legacy and modern apps in any environment avoiding costly infrastructure lock‑in.
Solution Components
NGINX Load balancer and Red Hat Enterprise Linux
Value Proposition
NGINX sitting on top web and application servers as a Layer 7 load balancer increases the web application's efficiency, reliability, and performance.
Demo Time
15 mins
CoE CODE : SE-M29
F5 Policy Enforcement Manager Bandwidth Control and Monitoring
Perform bandwidth control to limit the speed of connectivity when user accessing to internet or applications together with verifying and monitoring users' activities.
Solution Components
F5 PEM
Value Proposition
F5 PEM can help to implement services based on subscriber level, according to plan, location, and device. In addition to recognizing who should access what and when, you’ll be able to gather data with network visibility. Create relevant plan tiers and offer new, over-the-top services based on user behavior patterns
Demo Time
15 mins
CoE CODE : SE-I12
Intelligent Layer 7 DoS and Brute Force Protection for Web Applications
F5 ASM & LTM, which resides between applications and users, can detect and protect against a layer 7 attack in real-time using advance WAF
Solution Components
F5 ASM (AWAF), LTM, MS Azure
Value Proposition
F5 BIG-IP ASM offers an all-in-one solution for protecting applications and organizations from attacks like (DDOS, SQL-injection, cross-site scripting etc.) & help customers access their applications securely irrespective to their location.
Demo Time
60 mins