SlideShare a Scribd company logo
1 of 48
Download to read offline
©2023 F5
1
Maria Julia Salazar
Major Account Manager
Making App Security and Delivery
Ridiculously Easy
©2023 F5
2 ©2023 F5
2
The way organizations deployed apps used to be very simple
2013
Traditional
Data Centers
©2023 F5
3 ©2023 F5
3
In 2017, it was commonly assumed that in the ‘end state’,
all apps would be in the public cloud
2013
Traditional
Data Centers
2023
Public Cloud
2013
Traditional
Data Centers
©2023 F5
4 ©2023 F5
4
Organizations were looking for specific business benefits
Greater
business agility
Improved
TCO
Increased
uptime
More reliable
security
©2023 F5
5 ©2023 F5
5
That prediction was
wrong on multiple levels
©2023 F5
6 ©2023 F5
6
Truth is, apps went where the business needed them
AWS
15%
Private cloud
23%
Colocation
11%
Azure
Google
Cloud
7%
Edge
12%
11%
Traditional
data centers
21%
©2023 F5
7 ©2023 F5
7
Public cloud is not just a new location for apps
Logic API
Data GUI
©2023 F5
8 ©2023 F5
8
The cloud accelerated the emergence of modern apps:
decomposed and dynamic vs. monolithic and transactional
GUI
Logic API
Data
Traditional App Modern App
Logic API
Data GUI
©2023 F5
9 ©2023 F5
9
So not only did traditional apps move to multiple
environments…
AWS
Private cloud
Colocation
Azure
Traditional
data centers
Google
Cloud
Edge
15%
23%
11%
7%
12%
11%
21%
©2023 F5
10 ©2023 F5
10
… but modern apps exploded and are now distributed
dynamically across locations
AWS
Private cloud
Traditional
data centers
Colocation
Azure
Google
Cloud
Edge
15%
23%
11%
7%
12%
11%
21%
©2023 F5
11 ©2023 F5
11
… but modern apps exploded and are now distributed
dynamically across locations
AWS
Private cloud
Traditional
data centers
Colocation
Azure
Google
Cloud
Edge
15%
23%
11%
7%
12%
11%
21%
©2023 F5
12 ©2023 F5
12
APIs and app-to-app connections have increased complexity
AWS
Private cloud
Traditional
data centers
Colocation
Azure
Google
Cloud
Edge
API
API
API
API
API
API
API
API
API
15%
23%
11%
7%
12%
11%
21%
©2023 F5
13 ©2023 F5
13
Expanded attack surfaces and increased attacker
sophistication have made security more difficult
AWS
Private cloud
Traditional
data centers
Colocation
Azure
Google
Cloud
Edge
API
API
API
API
API
API
API API
API
15%
23%
11%
7%
12%
11%
21%
©2023 F5
14 ©2023 F5
14
Lastly, data about your apps sits everywhere, preventing easy
use and diagnosis of issues
AWS
Private cloud
Traditional
data centers
Colocation
Azure
Google
Cloud
Edge
API
API
API
API
API
API
API API
API
15%
23%
11%
7%
12%
11%
21%
©2023 F5
15
External partnerships mean that risk is not insulated
API
API
API
API
API
API
API API
API
API
API
API
API
API
API
API API
API
API
API
API
API
API
API
API API
API
©2023 F5
16
API
API
API
API
API
API
API API
API
API
API
API
API
API
API
API API
API
The problem is further complicated by M&A
API
API
API
API
API
API
API API
API
API
API
API
API
API
API
API API
API
©2023 F5
17 ©2023 F5
17
API
API
API
API
API
API
API API
API
This is where
we thought we
would be...
and this is where we
have ended up
Public
cloud
API
API
API
API
API
API
API API
API
API
API
API
API
API
API
API API
API
API
API
API
API
API
API
API API
API
©2023 F5
18 ©2023 F5
18
The gains we expected to see have not materialized
Greater
business agility
Improved
TCO
Increased
uptime
More reliable
security
©2023 F5
19 ©2023 F5
19
Five years ago, F5 set out to make
it possible for customers to use
our technology to secure and
deliver any app or API, anywhere.
©2023 F5
20 ©2023 F5
20
AWS
Private cloud
Traditional
data centers
Colocation
Azure
Google
Cloud
Edge
We supported
traditional apps with
BIG-IP in customers’
data centers
BIG-IP
An enterprise-class application
delivery controller that secures
and delivers traditional applications
in on-premises environments.
©2023 F5
21 ©2023 F5
21
AWS
Private cloud
Traditional
data centers
Colocation
Azure
Google
Cloud
Edge
We refactored BIG-IP
for pure software and
cloud environments
BIG-IP
An enterprise-class application
delivery controller that secures
and delivers traditional applications
in on-premises, hybrid, and
multi-cloud environments.
©2023 F5
22 ©2023 F5
22
AWS
Private cloud
Traditional
data centers
Colocation
Azure
Google
Cloud
Edge
We acquired NGINX
to power apps and
APIs in containerized
environments
NGINX
BIG-IP
Cloud-native, Kubernetes-friendly
open source and enterprise
solutions that power mission-critical
apps and APIs with scalability,
visibility, security, and governance.
API
API
API
API
API
API
©2023 F5
23 ©2023 F5
23
We enhanced our
app security portfolio by
acquiring Silverline,
Shape, and Threat Stack
Enhanced App Security
NGINX
BIG-IP
Multiple layers of security controls for
modern and legacy apps. Industry-leading
WAF and DDoS protection augmented with
highly efficacious mitigation of bot attacks
and digital fraud, as well as protection of
app infrastructure through advanced
telemetry and behavioral analysis.
AWS
Private cloud
Traditional
data centers
Colocation
Azure
Google
Cloud
Edge
©2023 F5
24 ©2023 F5
24
With all these advances, we have
now made it possible for our
customers to use F5 to secure and
deliver any app or API, anywhere
©2023 F5
25 ©2023 F5
25
In the process, we have reached these milestones of our own
transformation:
• 50%+ product revenues are from software
• Over $1B revenues from security offerings
• 4,000 customers who use F5 in public clouds
• Trusted by 85% of the Fortune 500
©2023 F5
26 ©2023 F5
26
Enhanced App Security
NGINX
BIG-IP
We have made
substantial progress,
but securing and
delivering apps is still
very complex
API
API
API
API
API
API
API API
API
Edge
Google
Cloud
Azure
AWS Traditional
data centers
Colocation
Private cloud
©2023 F5
27 ©2023 F5
27
It’s easy to see the benefits of streamlining
complex manual processes
©2023 F5
28 ©2023 F5
28
In 2022, F5 embarked on a mission
to make securing, delivering, and
optimizing apps ridiculously easy
©2023 F5
29 ©2023 F5
29
Today, getting an app to your customers involves a
multitude of products, services, and vendors
AWS
Private cloud
Traditional
data centers
Colocation
Azure
Google
Cloud
6%
Edge
API
API
API
API
API
API
API
API
API
App
Management
DDoS
App
Connectivity
Ingress
Controller
CDN
Router
Network
Firewall
Front Load
Balancer
WAF
WAF
CDN
LB
DDoS
CDN
IC
Rout.
WAF
AM
WAF
IC
IC
CDN
DDoS
AC
WAF
Complex ecosystem
Logic API
Data GUI
CDN
LB
©2023 F5
30 ©2023 F5
30
In addition, a single app requires stringing together services
and many different skillsets across many different teams
Logic API
Data GUI
Deploy Connect Secure Operate
NetOps
DevOps SRE
SecOps
Dev
Ops
App
Management
DDoS App
Connectivity
Ingress
Controller
CDN
Router
Network
Firewall
Front Load
Balancer
WAF
Months of work
©2023 F5
31 ©2023 F5
31
What if you had a much simpler way
to do all that?
©2023 F5
32 ©2023 F5
32
F5 Distributed Cloud
Services is a single
platform for all of
your application
delivery and security
services across
any environment.
Secure all apps and
APIs everywhere
API
API
API
API
API
API
API API
API
©2023 F5
33 ©2023 F5
33
F5 Distributed Cloud
Services is a single
platform for all of
your application
delivery and security
services across
any environment.
Connectivity for
every user and app
Secure all apps and
APIs everywhere
API
API
API
API
API
API
API API
API
©2023 F5
34 ©2023 F5
34
F5 Distributed Cloud
Services is a single
platform for all of
your application
delivery and security
services across
any environment.
Connectivity for
every user and app
Run apps
anywhere
Secure all apps and
APIs everywhere
API
API
API
API
API
API
API API
API
©2023 F5
35 ©2023 F5
35
F5 Distributed Cloud
Services is a single
platform for all of
your application
delivery and security
services across
any environment.
Connectivity for
every user and app
Run apps
anywhere
Secure all apps and
APIs everywhere
Visibility, analytics,
and control
API
©2023 F5
36 ©2023 F5
36
Deliver measurable benefits to your application and
delivery process
Greater
business agility
12x
Reduction in
time to service
Improved
TCO
Increased
uptime
More reliable
security
75%
Reduction in TCO
(Deploy and Ops)
95%
Reduction in
downtime due to
security attacks
9.5x
Quicker policy
propagation times
©2023 F5
37 ©2023 F5
37
Less than 1 hour of work
That’s how F5 helps
you deliver a new app
in minutes, not months
Logic API
Data GUI
©2023 F5
38 ©2023 F5
38
Modernization of 200-app legacy
environment
One platform to secure, deliver and
manage apps
Centralized security policies and API
discovery
F5 customers are
already taking
advantage of.. Run apps
anywhere
Secure all apps and
APIs everywhere
Visibility, analytics,
and control
Connectivity for
every user and app
Public Cloud
On prem / DC
On prem / DC
API
API
API
API
API
API
API
API
API
©2023 F5
39 ©2023 F5
39
F5 customers are
already taking
advantage of..
WAF policy unification across multi-cloud
Multiple security controls and simplified
management in one SaaS offering​
Single platform to support expansion to
new regions
Added CDN for simplified operation with
rich visibility & robust edge capabilities
Run apps
anywhere
Secure all apps and
APIs everywhere
Visibility, analytics,
and control
Connectivity for
every user and app
Public Cloud
On prem / DC
API
API
API
API
API
API
Public Cloud
API
API
API
©2023 F5
40
We will enable
customers to
experience the
full F5 portfolio
through the
Distributed
Cloud Platform
App
Management
DDoS Router
Legacy
(monolithic, client-server, 3-tier)
On-Prem, Colo
On-Prem,
Colo
Cloud
Hardware Packaged Software
Perpetual
Perpetual
Subscription
Utility/Consumption
BIG-IP
BIG-IP Next Central Mgr.
Configuration
App
Connectivity
Network
Firewall
Front Load
Balancer
Modern
(container-native, microservices)
On-Prem, Colo Cloud
Packaged Software
Subscription Utility/Consumption
SaaS
NGINX Mgmt. Suite
Configuration
Ingress
Controller
CDN
WAF
Legacy & Modern
Edge
Cloud
On-Prem,
Colo
SaaS Managed Services
Subscription Utility/Consumption
Dist. Cloud Console
Configuration
Threat
dashboard
Premium
support
Data platform
& analytics
Alerts Single
sign on
License
management
Centralized
view
©2023 F5
41
Expectations have been high for AI
“En tres a ocho años tendremos una
máquina con la inteligencia general de
un ser humano promedio”
“In three to eight years we will have a
machine with the general intelligence of
an average human being.”
Marvin Minsky, MIT
1970
©2023 F5
42
And AI has been evolving for three quarters of a century
History of Artificial Intelligence
1950
Turing Test
1955
The Term AI
1960
GANs
1970s–1980s
AI Winter
Genetic Programming
1986
Backpropagation
1966
Eliza
1956
Perceptron
K-Means Clustering
2023
Open Source LLMs
LangChain
Vector Databases
2022
ChatGPT
(GPT-3)
2021
DALL-E
2018
OpenAI—GPT-1
2014
Alexa
2017
Automated
Recommenders
Surpass Humans
1997
Deep Blue
LSTMs
2011
Watson
1995
SVMs
2006
Deep Neural
Networks
2005
Self-Driving
Vehicles
2017
AlphaGo
2021
Cancer
Identification
©2023 F5
45
2021
Threat Stack uses AI/ML
for cloud native app
protection
2021
API discovery on XC leveraged
AI and out-of-box WAF used AI
to eliminate false positives
2019
AI/ML against bot
attacks with Shape
2015
ML in iHealth to identity
problems in customer’s
BIG-IP configurations
2016
Anomaly detection
for DDoS
2014
Behavioral anomaly
analysis detection
on AWAF
2008
Defense.net (DDoS) a
system backed by a limited
heuristic learning complex
2011
ML to optimize network
stack on BIG-IP
2012
Learning mode (ML)
in AWAF to reduce
false positives
F5 has its own history with AI…
©2023 F5
47 ©2023 F5
47
Applying the power of
Generative AI to F5
services, starting with
two immediate areas
Connectivity for
every user and app
Run apps
anywhere
Secure all apps and
APIs everywhere
Visibility, analytics,
and control
©2023 F5
48 ©2023 F5
48
We’re ready to help you get started with Distributed Cloud
Immediate help
for urgent needs
Partner with you to review
and design your multi-
cloud architecture
Evaluate current issues
related to operating and
deploying applications
©2023 F5
49 ©2023 F5
49
F5 is on a mission to take
the dauntingly complex and
make it ridiculously easy.
©2023 F5
50
Visual:
- Need new options for image
Let’s bring a
better digital world
to life – together
50 ©2022 F5
©2023 F5
51
GRACIAS

More Related Content

What's hot

NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explainedrtp2009
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Kangaroot
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...YouAttestSlideshare
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...carlitocabana
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to RealityPriyanka Aash
 
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsNetwork Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsEnterprise Management Associates
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopDavid Sweigert
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 

What's hot (20)

NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsNetwork Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network Operations
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
Zero Trust : How to Get Started
Zero Trust : How to Get StartedZero Trust : How to Get Started
Zero Trust : How to Get Started
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 

Similar to Making App Security and Delivery Ridiculously Easy

vCloud Air - Infrastructure and Application Services for the Enterprise
vCloud Air - Infrastructure and Application Services for the EnterprisevCloud Air - Infrastructure and Application Services for the Enterprise
vCloud Air - Infrastructure and Application Services for the EnterprisePhilip Say
 
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpAutomate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpMitchell Pronschinske
 
F5 and HashiCorp Multi-Cloud
F5 and HashiCorp Multi-CloudF5 and HashiCorp Multi-Cloud
F5 and HashiCorp Multi-Cloudabenyeung1
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPSecuring Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPOlivia LaMar
 
From Pivotal to VMware Tanzu: What you need to know
From Pivotal to VMware Tanzu: What you need to knowFrom Pivotal to VMware Tanzu: What you need to know
From Pivotal to VMware Tanzu: What you need to knowVMware Tanzu
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDon’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDevOps.com
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDon’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDevOps.com
 
Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation XebiaLabs
 
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...Alen Leit
 
Controller and Coffee: Deliver APIs in Real Time with API Management
Controller and Coffee: Deliver APIs in Real Time with API ManagementController and Coffee: Deliver APIs in Real Time with API Management
Controller and Coffee: Deliver APIs in Real Time with API ManagementNGINX, Inc.
 
Accelerate Your Digital Transformation: How to Achieve Business Agility with ...
Accelerate Your Digital Transformation: How to Achieve Business Agility with ...Accelerate Your Digital Transformation: How to Achieve Business Agility with ...
Accelerate Your Digital Transformation: How to Achieve Business Agility with ...XebiaLabs
 
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesOPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesVMware Tanzu
 
Application Security with NGINX
Application Security with NGINXApplication Security with NGINX
Application Security with NGINXNGINX, Inc.
 
API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice?API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice?VMware Tanzu
 
API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice?  API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice? Rohit Kelapure
 
Cloud-Native Insights: How Platform & App Visibility Drive Business Outcomes
Cloud-Native Insights: How Platform & App Visibility Drive Business OutcomesCloud-Native Insights: How Platform & App Visibility Drive Business Outcomes
Cloud-Native Insights: How Platform & App Visibility Drive Business OutcomesVMware Tanzu
 
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
Strengthen Security and Traffic Visibility on Amazon EKS with NGINXStrengthen Security and Traffic Visibility on Amazon EKS with NGINX
Strengthen Security and Traffic Visibility on Amazon EKS with NGINXNGINX, Inc.
 
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXSuccessfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXNGINX, Inc.
 
Application Security with NGINX | APAC
Application Security with NGINX | APACApplication Security with NGINX | APAC
Application Security with NGINX | APACNGINX, Inc.
 
From Code to Customer with F5 and NGNX London Nov 19
From Code to Customer with F5 and NGNX London Nov 19From Code to Customer with F5 and NGNX London Nov 19
From Code to Customer with F5 and NGNX London Nov 19NGINX, Inc.
 

Similar to Making App Security and Delivery Ridiculously Easy (20)

vCloud Air - Infrastructure and Application Services for the Enterprise
vCloud Air - Infrastructure and Application Services for the EnterprisevCloud Air - Infrastructure and Application Services for the Enterprise
vCloud Air - Infrastructure and Application Services for the Enterprise
 
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpAutomate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corp
 
F5 and HashiCorp Multi-Cloud
F5 and HashiCorp Multi-CloudF5 and HashiCorp Multi-Cloud
F5 and HashiCorp Multi-Cloud
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPSecuring Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
 
From Pivotal to VMware Tanzu: What you need to know
From Pivotal to VMware Tanzu: What you need to knowFrom Pivotal to VMware Tanzu: What you need to know
From Pivotal to VMware Tanzu: What you need to know
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDon’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDon’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
 
Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation
 
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...
 
Controller and Coffee: Deliver APIs in Real Time with API Management
Controller and Coffee: Deliver APIs in Real Time with API ManagementController and Coffee: Deliver APIs in Real Time with API Management
Controller and Coffee: Deliver APIs in Real Time with API Management
 
Accelerate Your Digital Transformation: How to Achieve Business Agility with ...
Accelerate Your Digital Transformation: How to Achieve Business Agility with ...Accelerate Your Digital Transformation: How to Achieve Business Agility with ...
Accelerate Your Digital Transformation: How to Achieve Business Agility with ...
 
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesOPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu Slides
 
Application Security with NGINX
Application Security with NGINXApplication Security with NGINX
Application Security with NGINX
 
API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice?API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice?
 
API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice?  API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice?
 
Cloud-Native Insights: How Platform & App Visibility Drive Business Outcomes
Cloud-Native Insights: How Platform & App Visibility Drive Business OutcomesCloud-Native Insights: How Platform & App Visibility Drive Business Outcomes
Cloud-Native Insights: How Platform & App Visibility Drive Business Outcomes
 
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
Strengthen Security and Traffic Visibility on Amazon EKS with NGINXStrengthen Security and Traffic Visibility on Amazon EKS with NGINX
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
 
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXSuccessfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINX
 
Application Security with NGINX | APAC
Application Security with NGINX | APACApplication Security with NGINX | APAC
Application Security with NGINX | APAC
 
From Code to Customer with F5 and NGNX London Nov 19
From Code to Customer with F5 and NGNX London Nov 19From Code to Customer with F5 and NGNX London Nov 19
From Code to Customer with F5 and NGNX London Nov 19
 

More from Cristian Garcia G.

Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCristian Garcia G.
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Cristian Garcia G.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACristian Garcia G.
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Cristian Garcia G.
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoCristian Garcia G.
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoCristian Garcia G.
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecinaCristian Garcia G.
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoCristian Garcia G.
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Cristian Garcia G.
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Cristian Garcia G.
 
COCINA INTERACTIVA : UN ENCUENTRO DE EXPERIENCIAS
COCINA INTERACTIVA : UN ENCUENTRO DE EXPERIENCIASCOCINA INTERACTIVA : UN ENCUENTRO DE EXPERIENCIAS
COCINA INTERACTIVA : UN ENCUENTRO DE EXPERIENCIASCristian Garcia G.
 
WEBINAR : WINDOWS 2019 HARDENING (Aseguramiento)
WEBINAR : WINDOWS 2019 HARDENING (Aseguramiento)WEBINAR : WINDOWS 2019 HARDENING (Aseguramiento)
WEBINAR : WINDOWS 2019 HARDENING (Aseguramiento)Cristian Garcia G.
 
WINDOWS 2019 HARDENING (Aseguramiento)
WINDOWS 2019 HARDENING (Aseguramiento)WINDOWS 2019 HARDENING (Aseguramiento)
WINDOWS 2019 HARDENING (Aseguramiento)Cristian Garcia G.
 
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Part1
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Part1CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Part1
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Part1Cristian Garcia G.
 
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Parte 2
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Parte 2CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Parte 2
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Parte 2Cristian Garcia G.
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBECristian Garcia G.
 
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS Cristian Garcia G.
 

More from Cristian Garcia G. (20)

Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Symantec Enterprise Cloud
Symantec Enterprise CloudSymantec Enterprise Cloud
Symantec Enterprise Cloud
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
 
Gestión de la Exposición
Gestión de la ExposiciónGestión de la Exposición
Gestión de la Exposición
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecina
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
 
ESTAFAS EN LA RED
ESTAFAS EN LA REDESTAFAS EN LA RED
ESTAFAS EN LA RED
 
COCINA INTERACTIVA : UN ENCUENTRO DE EXPERIENCIAS
COCINA INTERACTIVA : UN ENCUENTRO DE EXPERIENCIASCOCINA INTERACTIVA : UN ENCUENTRO DE EXPERIENCIAS
COCINA INTERACTIVA : UN ENCUENTRO DE EXPERIENCIAS
 
WEBINAR : WINDOWS 2019 HARDENING (Aseguramiento)
WEBINAR : WINDOWS 2019 HARDENING (Aseguramiento)WEBINAR : WINDOWS 2019 HARDENING (Aseguramiento)
WEBINAR : WINDOWS 2019 HARDENING (Aseguramiento)
 
WINDOWS 2019 HARDENING (Aseguramiento)
WINDOWS 2019 HARDENING (Aseguramiento)WINDOWS 2019 HARDENING (Aseguramiento)
WINDOWS 2019 HARDENING (Aseguramiento)
 
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Part1
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Part1CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Part1
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Part1
 
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Parte 2
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Parte 2CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Parte 2
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Parte 2
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
 

Recently uploaded

TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 

Recently uploaded (20)

TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 

Making App Security and Delivery Ridiculously Easy

  • 1. ©2023 F5 1 Maria Julia Salazar Major Account Manager Making App Security and Delivery Ridiculously Easy
  • 2. ©2023 F5 2 ©2023 F5 2 The way organizations deployed apps used to be very simple 2013 Traditional Data Centers
  • 3. ©2023 F5 3 ©2023 F5 3 In 2017, it was commonly assumed that in the ‘end state’, all apps would be in the public cloud 2013 Traditional Data Centers 2023 Public Cloud 2013 Traditional Data Centers
  • 4. ©2023 F5 4 ©2023 F5 4 Organizations were looking for specific business benefits Greater business agility Improved TCO Increased uptime More reliable security
  • 5. ©2023 F5 5 ©2023 F5 5 That prediction was wrong on multiple levels
  • 6. ©2023 F5 6 ©2023 F5 6 Truth is, apps went where the business needed them AWS 15% Private cloud 23% Colocation 11% Azure Google Cloud 7% Edge 12% 11% Traditional data centers 21%
  • 7. ©2023 F5 7 ©2023 F5 7 Public cloud is not just a new location for apps Logic API Data GUI
  • 8. ©2023 F5 8 ©2023 F5 8 The cloud accelerated the emergence of modern apps: decomposed and dynamic vs. monolithic and transactional GUI Logic API Data Traditional App Modern App Logic API Data GUI
  • 9. ©2023 F5 9 ©2023 F5 9 So not only did traditional apps move to multiple environments… AWS Private cloud Colocation Azure Traditional data centers Google Cloud Edge 15% 23% 11% 7% 12% 11% 21%
  • 10. ©2023 F5 10 ©2023 F5 10 … but modern apps exploded and are now distributed dynamically across locations AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge 15% 23% 11% 7% 12% 11% 21%
  • 11. ©2023 F5 11 ©2023 F5 11 … but modern apps exploded and are now distributed dynamically across locations AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge 15% 23% 11% 7% 12% 11% 21%
  • 12. ©2023 F5 12 ©2023 F5 12 APIs and app-to-app connections have increased complexity AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge API API API API API API API API API 15% 23% 11% 7% 12% 11% 21%
  • 13. ©2023 F5 13 ©2023 F5 13 Expanded attack surfaces and increased attacker sophistication have made security more difficult AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge API API API API API API API API API 15% 23% 11% 7% 12% 11% 21%
  • 14. ©2023 F5 14 ©2023 F5 14 Lastly, data about your apps sits everywhere, preventing easy use and diagnosis of issues AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge API API API API API API API API API 15% 23% 11% 7% 12% 11% 21%
  • 15. ©2023 F5 15 External partnerships mean that risk is not insulated API API API API API API API API API API API API API API API API API API API API API API API API API API API
  • 16. ©2023 F5 16 API API API API API API API API API API API API API API API API API API The problem is further complicated by M&A API API API API API API API API API API API API API API API API API API
  • 17. ©2023 F5 17 ©2023 F5 17 API API API API API API API API API This is where we thought we would be... and this is where we have ended up Public cloud API API API API API API API API API API API API API API API API API API API API API API API API API API API
  • 18. ©2023 F5 18 ©2023 F5 18 The gains we expected to see have not materialized Greater business agility Improved TCO Increased uptime More reliable security
  • 19. ©2023 F5 19 ©2023 F5 19 Five years ago, F5 set out to make it possible for customers to use our technology to secure and deliver any app or API, anywhere.
  • 20. ©2023 F5 20 ©2023 F5 20 AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge We supported traditional apps with BIG-IP in customers’ data centers BIG-IP An enterprise-class application delivery controller that secures and delivers traditional applications in on-premises environments.
  • 21. ©2023 F5 21 ©2023 F5 21 AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge We refactored BIG-IP for pure software and cloud environments BIG-IP An enterprise-class application delivery controller that secures and delivers traditional applications in on-premises, hybrid, and multi-cloud environments.
  • 22. ©2023 F5 22 ©2023 F5 22 AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge We acquired NGINX to power apps and APIs in containerized environments NGINX BIG-IP Cloud-native, Kubernetes-friendly open source and enterprise solutions that power mission-critical apps and APIs with scalability, visibility, security, and governance. API API API API API API
  • 23. ©2023 F5 23 ©2023 F5 23 We enhanced our app security portfolio by acquiring Silverline, Shape, and Threat Stack Enhanced App Security NGINX BIG-IP Multiple layers of security controls for modern and legacy apps. Industry-leading WAF and DDoS protection augmented with highly efficacious mitigation of bot attacks and digital fraud, as well as protection of app infrastructure through advanced telemetry and behavioral analysis. AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge
  • 24. ©2023 F5 24 ©2023 F5 24 With all these advances, we have now made it possible for our customers to use F5 to secure and deliver any app or API, anywhere
  • 25. ©2023 F5 25 ©2023 F5 25 In the process, we have reached these milestones of our own transformation: • 50%+ product revenues are from software • Over $1B revenues from security offerings • 4,000 customers who use F5 in public clouds • Trusted by 85% of the Fortune 500
  • 26. ©2023 F5 26 ©2023 F5 26 Enhanced App Security NGINX BIG-IP We have made substantial progress, but securing and delivering apps is still very complex API API API API API API API API API Edge Google Cloud Azure AWS Traditional data centers Colocation Private cloud
  • 27. ©2023 F5 27 ©2023 F5 27 It’s easy to see the benefits of streamlining complex manual processes
  • 28. ©2023 F5 28 ©2023 F5 28 In 2022, F5 embarked on a mission to make securing, delivering, and optimizing apps ridiculously easy
  • 29. ©2023 F5 29 ©2023 F5 29 Today, getting an app to your customers involves a multitude of products, services, and vendors AWS Private cloud Traditional data centers Colocation Azure Google Cloud 6% Edge API API API API API API API API API App Management DDoS App Connectivity Ingress Controller CDN Router Network Firewall Front Load Balancer WAF WAF CDN LB DDoS CDN IC Rout. WAF AM WAF IC IC CDN DDoS AC WAF Complex ecosystem Logic API Data GUI CDN LB
  • 30. ©2023 F5 30 ©2023 F5 30 In addition, a single app requires stringing together services and many different skillsets across many different teams Logic API Data GUI Deploy Connect Secure Operate NetOps DevOps SRE SecOps Dev Ops App Management DDoS App Connectivity Ingress Controller CDN Router Network Firewall Front Load Balancer WAF Months of work
  • 31. ©2023 F5 31 ©2023 F5 31 What if you had a much simpler way to do all that?
  • 32. ©2023 F5 32 ©2023 F5 32 F5 Distributed Cloud Services is a single platform for all of your application delivery and security services across any environment. Secure all apps and APIs everywhere API API API API API API API API API
  • 33. ©2023 F5 33 ©2023 F5 33 F5 Distributed Cloud Services is a single platform for all of your application delivery and security services across any environment. Connectivity for every user and app Secure all apps and APIs everywhere API API API API API API API API API
  • 34. ©2023 F5 34 ©2023 F5 34 F5 Distributed Cloud Services is a single platform for all of your application delivery and security services across any environment. Connectivity for every user and app Run apps anywhere Secure all apps and APIs everywhere API API API API API API API API API
  • 35. ©2023 F5 35 ©2023 F5 35 F5 Distributed Cloud Services is a single platform for all of your application delivery and security services across any environment. Connectivity for every user and app Run apps anywhere Secure all apps and APIs everywhere Visibility, analytics, and control API
  • 36. ©2023 F5 36 ©2023 F5 36 Deliver measurable benefits to your application and delivery process Greater business agility 12x Reduction in time to service Improved TCO Increased uptime More reliable security 75% Reduction in TCO (Deploy and Ops) 95% Reduction in downtime due to security attacks 9.5x Quicker policy propagation times
  • 37. ©2023 F5 37 ©2023 F5 37 Less than 1 hour of work That’s how F5 helps you deliver a new app in minutes, not months Logic API Data GUI
  • 38. ©2023 F5 38 ©2023 F5 38 Modernization of 200-app legacy environment One platform to secure, deliver and manage apps Centralized security policies and API discovery F5 customers are already taking advantage of.. Run apps anywhere Secure all apps and APIs everywhere Visibility, analytics, and control Connectivity for every user and app Public Cloud On prem / DC On prem / DC API API API API API API API API API
  • 39. ©2023 F5 39 ©2023 F5 39 F5 customers are already taking advantage of.. WAF policy unification across multi-cloud Multiple security controls and simplified management in one SaaS offering​ Single platform to support expansion to new regions Added CDN for simplified operation with rich visibility & robust edge capabilities Run apps anywhere Secure all apps and APIs everywhere Visibility, analytics, and control Connectivity for every user and app Public Cloud On prem / DC API API API API API API Public Cloud API API API
  • 40. ©2023 F5 40 We will enable customers to experience the full F5 portfolio through the Distributed Cloud Platform App Management DDoS Router Legacy (monolithic, client-server, 3-tier) On-Prem, Colo On-Prem, Colo Cloud Hardware Packaged Software Perpetual Perpetual Subscription Utility/Consumption BIG-IP BIG-IP Next Central Mgr. Configuration App Connectivity Network Firewall Front Load Balancer Modern (container-native, microservices) On-Prem, Colo Cloud Packaged Software Subscription Utility/Consumption SaaS NGINX Mgmt. Suite Configuration Ingress Controller CDN WAF Legacy & Modern Edge Cloud On-Prem, Colo SaaS Managed Services Subscription Utility/Consumption Dist. Cloud Console Configuration Threat dashboard Premium support Data platform & analytics Alerts Single sign on License management Centralized view
  • 41. ©2023 F5 41 Expectations have been high for AI “En tres a ocho años tendremos una máquina con la inteligencia general de un ser humano promedio” “In three to eight years we will have a machine with the general intelligence of an average human being.” Marvin Minsky, MIT 1970
  • 42. ©2023 F5 42 And AI has been evolving for three quarters of a century History of Artificial Intelligence 1950 Turing Test 1955 The Term AI 1960 GANs 1970s–1980s AI Winter Genetic Programming 1986 Backpropagation 1966 Eliza 1956 Perceptron K-Means Clustering 2023 Open Source LLMs LangChain Vector Databases 2022 ChatGPT (GPT-3) 2021 DALL-E 2018 OpenAI—GPT-1 2014 Alexa 2017 Automated Recommenders Surpass Humans 1997 Deep Blue LSTMs 2011 Watson 1995 SVMs 2006 Deep Neural Networks 2005 Self-Driving Vehicles 2017 AlphaGo 2021 Cancer Identification
  • 43. ©2023 F5 45 2021 Threat Stack uses AI/ML for cloud native app protection 2021 API discovery on XC leveraged AI and out-of-box WAF used AI to eliminate false positives 2019 AI/ML against bot attacks with Shape 2015 ML in iHealth to identity problems in customer’s BIG-IP configurations 2016 Anomaly detection for DDoS 2014 Behavioral anomaly analysis detection on AWAF 2008 Defense.net (DDoS) a system backed by a limited heuristic learning complex 2011 ML to optimize network stack on BIG-IP 2012 Learning mode (ML) in AWAF to reduce false positives F5 has its own history with AI…
  • 44. ©2023 F5 47 ©2023 F5 47 Applying the power of Generative AI to F5 services, starting with two immediate areas Connectivity for every user and app Run apps anywhere Secure all apps and APIs everywhere Visibility, analytics, and control
  • 45. ©2023 F5 48 ©2023 F5 48 We’re ready to help you get started with Distributed Cloud Immediate help for urgent needs Partner with you to review and design your multi- cloud architecture Evaluate current issues related to operating and deploying applications
  • 46. ©2023 F5 49 ©2023 F5 49 F5 is on a mission to take the dauntingly complex and make it ridiculously easy.
  • 47. ©2023 F5 50 Visual: - Need new options for image Let’s bring a better digital world to life – together 50 ©2022 F5