Submit Search
Upload
Making App Security and Delivery Ridiculously Easy
•
0 likes
•
94 views
Cristian Garcia G.
Follow
Making App Security and Delivery Ridiculously Easy
Read less
Read more
Technology
Report
Share
Report
Share
1 of 48
Download now
Download to read offline
Recommended
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Cristian Garcia G.
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Cristian Garcia G.
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Cristian Garcia G.
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-Datacenter
Cristian Garcia G.
La evolución de IBM Qradar Suite
La evolución de IBM Qradar Suite
Cristian Garcia G.
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cristian Garcia G.
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
Cristian Garcia G.
F5 DDoS Protection
F5 DDoS Protection
MarketingArrowECS_CZ
Recommended
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Cristian Garcia G.
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Cristian Garcia G.
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Cristian Garcia G.
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-Datacenter
Cristian Garcia G.
La evolución de IBM Qradar Suite
La evolución de IBM Qradar Suite
Cristian Garcia G.
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cristian Garcia G.
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
Cristian Garcia G.
F5 DDoS Protection
F5 DDoS Protection
MarketingArrowECS_CZ
NIST Zero Trust Explained
NIST Zero Trust Explained
rtp2009
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
Kangaroot
cyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
YouAttestSlideshare
Complete Endpoint protection
Complete Endpoint protection
xband
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
carlitocabana
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
Priyanka Aash
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network Operations
Enterprise Management Associates
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
Alistair Pugin
Zero Trust Model
Zero Trust Model
Yash
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
Building Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
Splunk
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
David Sweigert
Zero Trust : How to Get Started
Zero Trust : How to Get Started
EyesOpen Association
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
vCloud Air - Infrastructure and Application Services for the Enterprise
vCloud Air - Infrastructure and Application Services for the Enterprise
Philip Say
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corp
Mitchell Pronschinske
More Related Content
What's hot
NIST Zero Trust Explained
NIST Zero Trust Explained
rtp2009
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
Kangaroot
cyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
YouAttestSlideshare
Complete Endpoint protection
Complete Endpoint protection
xband
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
carlitocabana
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
Priyanka Aash
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network Operations
Enterprise Management Associates
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
Alistair Pugin
Zero Trust Model
Zero Trust Model
Yash
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
Building Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
Splunk
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
David Sweigert
Zero Trust : How to Get Started
Zero Trust : How to Get Started
EyesOpen Association
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
What's hot
(20)
NIST Zero Trust Explained
NIST Zero Trust Explained
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
cyber-security-reference-architecture
cyber-security-reference-architecture
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
Complete Endpoint protection
Complete Endpoint protection
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network Operations
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
Zero Trust Model
Zero Trust Model
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Building Security Operation Center
Building Security Operation Center
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
Zero Trust : How to Get Started
Zero Trust : How to Get Started
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Similar to Making App Security and Delivery Ridiculously Easy
vCloud Air - Infrastructure and Application Services for the Enterprise
vCloud Air - Infrastructure and Application Services for the Enterprise
Philip Say
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corp
Mitchell Pronschinske
F5 and HashiCorp Multi-Cloud
F5 and HashiCorp Multi-Cloud
abenyeung1
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Olivia LaMar
From Pivotal to VMware Tanzu: What you need to know
From Pivotal to VMware Tanzu: What you need to know
VMware Tanzu
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
DevOps.com
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
DevOps.com
Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation
XebiaLabs
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...
Alen Leit
Controller and Coffee: Deliver APIs in Real Time with API Management
Controller and Coffee: Deliver APIs in Real Time with API Management
NGINX, Inc.
Accelerate Your Digital Transformation: How to Achieve Business Agility with ...
Accelerate Your Digital Transformation: How to Achieve Business Agility with ...
XebiaLabs
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu Slides
VMware Tanzu
Application Security with NGINX
Application Security with NGINX
NGINX, Inc.
API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice?
VMware Tanzu
API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice?
Rohit Kelapure
Cloud-Native Insights: How Platform & App Visibility Drive Business Outcomes
Cloud-Native Insights: How Platform & App Visibility Drive Business Outcomes
VMware Tanzu
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
NGINX, Inc.
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINX
NGINX, Inc.
Application Security with NGINX | APAC
Application Security with NGINX | APAC
NGINX, Inc.
From Code to Customer with F5 and NGNX London Nov 19
From Code to Customer with F5 and NGNX London Nov 19
NGINX, Inc.
Similar to Making App Security and Delivery Ridiculously Easy
(20)
vCloud Air - Infrastructure and Application Services for the Enterprise
vCloud Air - Infrastructure and Application Services for the Enterprise
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corp
F5 and HashiCorp Multi-Cloud
F5 and HashiCorp Multi-Cloud
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
From Pivotal to VMware Tanzu: What you need to know
From Pivotal to VMware Tanzu: What you need to know
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...
Aurea Enterprise Road map (cloud, microservies etc) - Aurea & Helmes Nordic S...
Controller and Coffee: Deliver APIs in Real Time with API Management
Controller and Coffee: Deliver APIs in Real Time with API Management
Accelerate Your Digital Transformation: How to Achieve Business Agility with ...
Accelerate Your Digital Transformation: How to Achieve Business Agility with ...
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu Slides
Application Security with NGINX
Application Security with NGINX
API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice?
API First or Events First: Is it a Binary Choice?
Cloud-Native Insights: How Platform & App Visibility Drive Business Outcomes
Cloud-Native Insights: How Platform & App Visibility Drive Business Outcomes
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINX
Application Security with NGINX | APAC
Application Security with NGINX | APAC
From Code to Customer with F5 and NGNX London Nov 19
From Code to Customer with F5 and NGNX London Nov 19
More from Cristian Garcia G.
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
Cristian Garcia G.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Cristian Garcia G.
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
Cristian Garcia G.
Symantec Enterprise Cloud
Symantec Enterprise Cloud
Cristian Garcia G.
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Cristian Garcia G.
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
Cristian Garcia G.
Gestión de la Exposición
Gestión de la Exposición
Cristian Garcia G.
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Cristian Garcia G.
La crisis de identidad que se avecina
La crisis de identidad que se avecina
Cristian Garcia G.
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Cristian Garcia G.
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Cristian Garcia G.
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
Cristian Garcia G.
ESTAFAS EN LA RED
ESTAFAS EN LA RED
Cristian Garcia G.
COCINA INTERACTIVA : UN ENCUENTRO DE EXPERIENCIAS
COCINA INTERACTIVA : UN ENCUENTRO DE EXPERIENCIAS
Cristian Garcia G.
WEBINAR : WINDOWS 2019 HARDENING (Aseguramiento)
WEBINAR : WINDOWS 2019 HARDENING (Aseguramiento)
Cristian Garcia G.
WINDOWS 2019 HARDENING (Aseguramiento)
WINDOWS 2019 HARDENING (Aseguramiento)
Cristian Garcia G.
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Part1
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Part1
Cristian Garcia G.
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Parte 2
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Parte 2
Cristian Garcia G.
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
Cristian Garcia G.
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
Cristian Garcia G.
More from Cristian Garcia G.
(20)
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
Symantec Enterprise Cloud
Symantec Enterprise Cloud
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
Gestión de la Exposición
Gestión de la Exposición
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
La crisis de identidad que se avecina
La crisis de identidad que se avecina
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
ESTAFAS EN LA RED
ESTAFAS EN LA RED
COCINA INTERACTIVA : UN ENCUENTRO DE EXPERIENCIAS
COCINA INTERACTIVA : UN ENCUENTRO DE EXPERIENCIAS
WEBINAR : WINDOWS 2019 HARDENING (Aseguramiento)
WEBINAR : WINDOWS 2019 HARDENING (Aseguramiento)
WINDOWS 2019 HARDENING (Aseguramiento)
WINDOWS 2019 HARDENING (Aseguramiento)
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Part1
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Part1
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Parte 2
CONTRARRESTADO ATAQUES DE INGENIERIA SOCIAL Parte 2
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
Recently uploaded
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
rightmanforbloodline
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
WSO2
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Zilliz
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard37
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
IES VE
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Orbitshub
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
johnbeverley2021
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
WSO2
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
Kumar Satyam
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Remote DBA Services
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
API Governance and Monetization - The evolution of API governance
API Governance and Monetization - The evolution of API governance
WSO2
Recently uploaded
(20)
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
API Governance and Monetization - The evolution of API governance
API Governance and Monetization - The evolution of API governance
Making App Security and Delivery Ridiculously Easy
1.
©2023 F5 1 Maria Julia
Salazar Major Account Manager Making App Security and Delivery Ridiculously Easy
2.
©2023 F5 2 ©2023
F5 2 The way organizations deployed apps used to be very simple 2013 Traditional Data Centers
3.
©2023 F5 3 ©2023
F5 3 In 2017, it was commonly assumed that in the ‘end state’, all apps would be in the public cloud 2013 Traditional Data Centers 2023 Public Cloud 2013 Traditional Data Centers
4.
©2023 F5 4 ©2023
F5 4 Organizations were looking for specific business benefits Greater business agility Improved TCO Increased uptime More reliable security
5.
©2023 F5 5 ©2023
F5 5 That prediction was wrong on multiple levels
6.
©2023 F5 6 ©2023
F5 6 Truth is, apps went where the business needed them AWS 15% Private cloud 23% Colocation 11% Azure Google Cloud 7% Edge 12% 11% Traditional data centers 21%
7.
©2023 F5 7 ©2023
F5 7 Public cloud is not just a new location for apps Logic API Data GUI
8.
©2023 F5 8 ©2023
F5 8 The cloud accelerated the emergence of modern apps: decomposed and dynamic vs. monolithic and transactional GUI Logic API Data Traditional App Modern App Logic API Data GUI
9.
©2023 F5 9 ©2023
F5 9 So not only did traditional apps move to multiple environments… AWS Private cloud Colocation Azure Traditional data centers Google Cloud Edge 15% 23% 11% 7% 12% 11% 21%
10.
©2023 F5 10 ©2023
F5 10 … but modern apps exploded and are now distributed dynamically across locations AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge 15% 23% 11% 7% 12% 11% 21%
11.
©2023 F5 11 ©2023
F5 11 … but modern apps exploded and are now distributed dynamically across locations AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge 15% 23% 11% 7% 12% 11% 21%
12.
©2023 F5 12 ©2023
F5 12 APIs and app-to-app connections have increased complexity AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge API API API API API API API API API 15% 23% 11% 7% 12% 11% 21%
13.
©2023 F5 13 ©2023
F5 13 Expanded attack surfaces and increased attacker sophistication have made security more difficult AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge API API API API API API API API API 15% 23% 11% 7% 12% 11% 21%
14.
©2023 F5 14 ©2023
F5 14 Lastly, data about your apps sits everywhere, preventing easy use and diagnosis of issues AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge API API API API API API API API API 15% 23% 11% 7% 12% 11% 21%
15.
©2023 F5 15 External partnerships
mean that risk is not insulated API API API API API API API API API API API API API API API API API API API API API API API API API API API
16.
©2023 F5 16 API API API API API API API API API API API API API API API API
API API The problem is further complicated by M&A API API API API API API API API API API API API API API API API API API
17.
©2023 F5 17 ©2023
F5 17 API API API API API API API API API This is where we thought we would be... and this is where we have ended up Public cloud API API API API API API API API API API API API API API API API API API API API API API API API API API API
18.
©2023 F5 18 ©2023
F5 18 The gains we expected to see have not materialized Greater business agility Improved TCO Increased uptime More reliable security
19.
©2023 F5 19 ©2023
F5 19 Five years ago, F5 set out to make it possible for customers to use our technology to secure and deliver any app or API, anywhere.
20.
©2023 F5 20 ©2023
F5 20 AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge We supported traditional apps with BIG-IP in customers’ data centers BIG-IP An enterprise-class application delivery controller that secures and delivers traditional applications in on-premises environments.
21.
©2023 F5 21 ©2023
F5 21 AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge We refactored BIG-IP for pure software and cloud environments BIG-IP An enterprise-class application delivery controller that secures and delivers traditional applications in on-premises, hybrid, and multi-cloud environments.
22.
©2023 F5 22 ©2023
F5 22 AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge We acquired NGINX to power apps and APIs in containerized environments NGINX BIG-IP Cloud-native, Kubernetes-friendly open source and enterprise solutions that power mission-critical apps and APIs with scalability, visibility, security, and governance. API API API API API API
23.
©2023 F5 23 ©2023
F5 23 We enhanced our app security portfolio by acquiring Silverline, Shape, and Threat Stack Enhanced App Security NGINX BIG-IP Multiple layers of security controls for modern and legacy apps. Industry-leading WAF and DDoS protection augmented with highly efficacious mitigation of bot attacks and digital fraud, as well as protection of app infrastructure through advanced telemetry and behavioral analysis. AWS Private cloud Traditional data centers Colocation Azure Google Cloud Edge
24.
©2023 F5 24 ©2023
F5 24 With all these advances, we have now made it possible for our customers to use F5 to secure and deliver any app or API, anywhere
25.
©2023 F5 25 ©2023
F5 25 In the process, we have reached these milestones of our own transformation: • 50%+ product revenues are from software • Over $1B revenues from security offerings • 4,000 customers who use F5 in public clouds • Trusted by 85% of the Fortune 500
26.
©2023 F5 26 ©2023
F5 26 Enhanced App Security NGINX BIG-IP We have made substantial progress, but securing and delivering apps is still very complex API API API API API API API API API Edge Google Cloud Azure AWS Traditional data centers Colocation Private cloud
27.
©2023 F5 27 ©2023
F5 27 It’s easy to see the benefits of streamlining complex manual processes
28.
©2023 F5 28 ©2023
F5 28 In 2022, F5 embarked on a mission to make securing, delivering, and optimizing apps ridiculously easy
29.
©2023 F5 29 ©2023
F5 29 Today, getting an app to your customers involves a multitude of products, services, and vendors AWS Private cloud Traditional data centers Colocation Azure Google Cloud 6% Edge API API API API API API API API API App Management DDoS App Connectivity Ingress Controller CDN Router Network Firewall Front Load Balancer WAF WAF CDN LB DDoS CDN IC Rout. WAF AM WAF IC IC CDN DDoS AC WAF Complex ecosystem Logic API Data GUI CDN LB
30.
©2023 F5 30 ©2023
F5 30 In addition, a single app requires stringing together services and many different skillsets across many different teams Logic API Data GUI Deploy Connect Secure Operate NetOps DevOps SRE SecOps Dev Ops App Management DDoS App Connectivity Ingress Controller CDN Router Network Firewall Front Load Balancer WAF Months of work
31.
©2023 F5 31 ©2023
F5 31 What if you had a much simpler way to do all that?
32.
©2023 F5 32 ©2023
F5 32 F5 Distributed Cloud Services is a single platform for all of your application delivery and security services across any environment. Secure all apps and APIs everywhere API API API API API API API API API
33.
©2023 F5 33 ©2023
F5 33 F5 Distributed Cloud Services is a single platform for all of your application delivery and security services across any environment. Connectivity for every user and app Secure all apps and APIs everywhere API API API API API API API API API
34.
©2023 F5 34 ©2023
F5 34 F5 Distributed Cloud Services is a single platform for all of your application delivery and security services across any environment. Connectivity for every user and app Run apps anywhere Secure all apps and APIs everywhere API API API API API API API API API
35.
©2023 F5 35 ©2023
F5 35 F5 Distributed Cloud Services is a single platform for all of your application delivery and security services across any environment. Connectivity for every user and app Run apps anywhere Secure all apps and APIs everywhere Visibility, analytics, and control API
36.
©2023 F5 36 ©2023
F5 36 Deliver measurable benefits to your application and delivery process Greater business agility 12x Reduction in time to service Improved TCO Increased uptime More reliable security 75% Reduction in TCO (Deploy and Ops) 95% Reduction in downtime due to security attacks 9.5x Quicker policy propagation times
37.
©2023 F5 37 ©2023
F5 37 Less than 1 hour of work That’s how F5 helps you deliver a new app in minutes, not months Logic API Data GUI
38.
©2023 F5 38 ©2023
F5 38 Modernization of 200-app legacy environment One platform to secure, deliver and manage apps Centralized security policies and API discovery F5 customers are already taking advantage of.. Run apps anywhere Secure all apps and APIs everywhere Visibility, analytics, and control Connectivity for every user and app Public Cloud On prem / DC On prem / DC API API API API API API API API API
39.
©2023 F5 39 ©2023
F5 39 F5 customers are already taking advantage of.. WAF policy unification across multi-cloud Multiple security controls and simplified management in one SaaS offering Single platform to support expansion to new regions Added CDN for simplified operation with rich visibility & robust edge capabilities Run apps anywhere Secure all apps and APIs everywhere Visibility, analytics, and control Connectivity for every user and app Public Cloud On prem / DC API API API API API API Public Cloud API API API
40.
©2023 F5 40 We will
enable customers to experience the full F5 portfolio through the Distributed Cloud Platform App Management DDoS Router Legacy (monolithic, client-server, 3-tier) On-Prem, Colo On-Prem, Colo Cloud Hardware Packaged Software Perpetual Perpetual Subscription Utility/Consumption BIG-IP BIG-IP Next Central Mgr. Configuration App Connectivity Network Firewall Front Load Balancer Modern (container-native, microservices) On-Prem, Colo Cloud Packaged Software Subscription Utility/Consumption SaaS NGINX Mgmt. Suite Configuration Ingress Controller CDN WAF Legacy & Modern Edge Cloud On-Prem, Colo SaaS Managed Services Subscription Utility/Consumption Dist. Cloud Console Configuration Threat dashboard Premium support Data platform & analytics Alerts Single sign on License management Centralized view
41.
©2023 F5 41 Expectations have
been high for AI “En tres a ocho años tendremos una máquina con la inteligencia general de un ser humano promedio” “In three to eight years we will have a machine with the general intelligence of an average human being.” Marvin Minsky, MIT 1970
42.
©2023 F5 42 And AI
has been evolving for three quarters of a century History of Artificial Intelligence 1950 Turing Test 1955 The Term AI 1960 GANs 1970s–1980s AI Winter Genetic Programming 1986 Backpropagation 1966 Eliza 1956 Perceptron K-Means Clustering 2023 Open Source LLMs LangChain Vector Databases 2022 ChatGPT (GPT-3) 2021 DALL-E 2018 OpenAI—GPT-1 2014 Alexa 2017 Automated Recommenders Surpass Humans 1997 Deep Blue LSTMs 2011 Watson 1995 SVMs 2006 Deep Neural Networks 2005 Self-Driving Vehicles 2017 AlphaGo 2021 Cancer Identification
43.
©2023 F5 45 2021 Threat Stack
uses AI/ML for cloud native app protection 2021 API discovery on XC leveraged AI and out-of-box WAF used AI to eliminate false positives 2019 AI/ML against bot attacks with Shape 2015 ML in iHealth to identity problems in customer’s BIG-IP configurations 2016 Anomaly detection for DDoS 2014 Behavioral anomaly analysis detection on AWAF 2008 Defense.net (DDoS) a system backed by a limited heuristic learning complex 2011 ML to optimize network stack on BIG-IP 2012 Learning mode (ML) in AWAF to reduce false positives F5 has its own history with AI…
44.
©2023 F5 47 ©2023
F5 47 Applying the power of Generative AI to F5 services, starting with two immediate areas Connectivity for every user and app Run apps anywhere Secure all apps and APIs everywhere Visibility, analytics, and control
45.
©2023 F5 48 ©2023
F5 48 We’re ready to help you get started with Distributed Cloud Immediate help for urgent needs Partner with you to review and design your multi- cloud architecture Evaluate current issues related to operating and deploying applications
46.
©2023 F5 49 ©2023
F5 49 F5 is on a mission to take the dauntingly complex and make it ridiculously easy.
47.
©2023 F5 50 Visual: - Need
new options for image Let’s bring a better digital world to life – together 50 ©2022 F5
48.
©2023 F5 51 GRACIAS
Download now