• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Adaptive Access: Contextual Security for Application Delivery Networks
 

Adaptive Access: Contextual Security for Application Delivery Networks

on

  • 598 views

Given the widespread use of mobile devices and the increasingly dynamic nature of applications, today's enterprise security must be both flexible and contextual, taking into account more than just who ...

Given the widespread use of mobile devices and the increasingly dynamic nature of applications, today's enterprise security must be both flexible and contextual, taking into account more than just who and what, but also when and from where and using what device over what channel and for what purpose? Learn how to integrate contextual security into your existing application delivery infrastructure through real-life customer examples and best practices.

Statistics

Views

Total Views
598
Views on SlideShare
598
Embed Views
0

Actions

Likes
0
Downloads
1
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Adaptive Access: Contextual Security for Application Delivery Networks Adaptive Access: Contextual Security for Application Delivery Networks Presentation Transcript

    • Adaptive Access Contextual Security for Application Delivery Networks Peter Silva, Technical Marketing Manager - F5 Networks Bill Podborney, Dir of Information Security – Alliant Credit Union
    • Adaptive Access Behavioral Based Contextual Security for Application Delivery Networks
    • Defense in Depth: A Heretic Speaks • Problems with DiD – “Slow Down” means Latency – Increased Complexity – Inefficient use of Resources – Improperly Deployed • Real World Impact – Slows New Technology Adoption – Not Easily Extensible – No Mandate for Integration