O documento discute como a F5 pode otimizar aplicações Microsoft para empresas. A F5 pode transformar a TI em uma ferramenta estratégica dos negócios, tornando a TI mais ágil para atender às necessidades dos negócios e permitindo um crescimento direcionado pelos negócios de forma flexível e segura. A parceria entre a F5 e a Microsoft permite distribuir, proteger e otimizar aplicativos Microsoft.
Relatório IBM X-Force ameaças e tendências de riscos Alexandre Freire
Apresentação IBM Solutions Connect 2013: Divulgação dos resultados do relatório de Riscos e Tendências do grupo de estudos de segurança IBM X-Force.Ataques de redes sociais, aumento de SQL Injection, spear phishing, ataques 0 Day Java e recomendações para implementação de controles para minimizar riscos no ambiente corporativo com adoção de soluções de Prevenção de Intrusos e sistemas de inteligência para correlação de eventos.
Apresentação IBM Solutions Connect 2013: Desafios da mobilidade nos ambientes corporativos. Soluções de segurança da IBM para proteção de ambientes móveis parte da iniciativa IBM Mobile First.
Some of the key organizational challenges for IT leadership are to maintain visibility and control across the IT organization and assure seamless execution within IT while maintaining effective engagement with the business.
Perhaps we can take a moment to touch on some of these dimensions of the management challenge that Mainwork holds expertise and is able to provide the overall solution enclosing software licenses, technical support and software maintenance, technology implementation operations.
Our Focus are
Application Lifecycle Management
Database Performance Management
High Availability for IT Systems
Network Management
Test Data Management & ILM
Relatório IBM X-Force ameaças e tendências de riscos Alexandre Freire
Apresentação IBM Solutions Connect 2013: Divulgação dos resultados do relatório de Riscos e Tendências do grupo de estudos de segurança IBM X-Force.Ataques de redes sociais, aumento de SQL Injection, spear phishing, ataques 0 Day Java e recomendações para implementação de controles para minimizar riscos no ambiente corporativo com adoção de soluções de Prevenção de Intrusos e sistemas de inteligência para correlação de eventos.
Apresentação IBM Solutions Connect 2013: Desafios da mobilidade nos ambientes corporativos. Soluções de segurança da IBM para proteção de ambientes móveis parte da iniciativa IBM Mobile First.
Some of the key organizational challenges for IT leadership are to maintain visibility and control across the IT organization and assure seamless execution within IT while maintaining effective engagement with the business.
Perhaps we can take a moment to touch on some of these dimensions of the management challenge that Mainwork holds expertise and is able to provide the overall solution enclosing software licenses, technical support and software maintenance, technology implementation operations.
Our Focus are
Application Lifecycle Management
Database Performance Management
High Availability for IT Systems
Network Management
Test Data Management & ILM
Acelerando o desenvolvimento na nuvem com BlueMix e DevOpsFelipe Freire
Em poucos minutos você pode desenvolver uma aplicação com os mesmos padrões e ferramentas utilizados pelas melhores empresas do mundo. Conheça o BlueMix, a implementação da IBM de PaaS, baseada em Cloud Foundry e recheada de serviços criados pela IBM para acelerar o desenvolvimento de aplicações na núvem. Dentre os serviços disponíveis está o DevOps Services que possibilita um eficiente ambiente de desenvolvimento em equipe.
Centenas de clientes da Cisco discutiram as vantagens e desvantagens de priorizar o menor preço na aquisição de um produto ou serviço para sua rede em vez de ter um plano estratégico para a arquitetura da sua interface de rede. Através de interações com diversos desses clientes, nós analisamos vários projetos e implementações de rede.
Nossas conclusões são de que embora haja espaço para construir uma rede tática de baixo custo, as operações contínuas, atualizações e falta de preparo para novos desafios corporativos representam obstáculos para empresas em longo prazo. Em vez de considerarem simplesmente os custos de capital, as empresas devem analisar também os custos de propriedade, incluindo os custos operacionais e o retorno do investimento (ROI), sem esquecer os recursos corporativos que uma rede estratégica pode oferecer, já que ela é construída tendo em vista as necessidades imediatas e futuras de cada empresa. A experiência de clientes e funcionários também deve fazer parte desta equação.
Com o aumento de dispositivos e da demanda por mobilidade, a rede oferece o contexto ideal para garantir conformidade e segurança. Quando combinada à tendência de virtualização e aos serviços de computação em nuvem, a rede torna-se o denominador comum que reúne todos esses sistemas, proporcionando um fluxo consistente de inteligência por toda a rede. Se pensarmos em um futuro com aplicações mais exigentes, como vídeo e virtualização de área de trabalho passando a fazer parte do dia a dia das empresas, a função estratégica da rede torna-se ainda mais crítica. Privilegiar o preço em vez da capacidade e do valor estratégico é uma aposta arriscada e já vimos isso dar errado muitas e muitas vezes.
Blog com todas as actualização disponíve em http://http://office-365-pt.blogspot.pt/
Apresentação do Microsoft Office 365 para o evento online (workshop).
Estratégia da IBM Security Systems para o mercado financeiro. Porfolio de soluções alinhadas com normas e regulamentações do segmento financeiro, Basileia, Banco Central, ISO 27001 e framerowk Cobit.
Digital Summit Brasil 2016 - Tech Trends + Cyber SecurityGustavo de Boer
Rodrigo Mendes, socio da Deloitte apresenta tendencias tecnologias e o futuro do Marketing Digital bem como questões sobre segurança para preparar as empresas para o futuro digital.
Palestra que integra apresentações do WSI Digital Summit 2016 Brasil na Amcham São Paulo ocorrida em 30 de novembro de 2016.
Gestão Ágil de Dados com Enterprise Data FabricDenodo
Watch full webinar here: https://bit.ly/3hkwgM7
Num mundo onde a aprendizagem automática e a inteligência artificial estão a mudar a nossa vida quotidiana, a transformação digital está no topo da agenda estratégica em muitas organizações privadas e governamentais. Os dados estão a tornar-se vitais nas empresas, para permitir percepções empresariais profundas, criar novas oportunidades, e optimizar as operações.
Os Chief Data Officers e os Data Architects estão sob pressão contínua para encontrar as melhores formas de gerir os volumes esmagadores de dados que tendem a tornar-se cada vez mais distribuídos e diversificados. A deslocação física dos dados para um único local para construção de relatórios e análises já não é uma opção - este é um facto aceite pela maioria dos profissionais de dados.
Junte-se a nós neste webinar para conhecer soluções de dados virtuais, incluindo:
- Virtual Data Fabric
- Data Mesh
- Arquitectura híbrida Multi-Cloud
e aprender como aproveitar a plataforma de Virtualização de Dados Denodo para implementar estas arquitecturas de dados modernas.
Uma introdução aos Serviços na Nuvem da Microsoft, com ênfase na Plataforma de Serviços Azure e o novo sistema operacional Windows Azure.
A Plataforma de Serviços Azure fornece uma abrangente gama de serviços na nuvem. Empresas podem utilizá-la para contruir aplicações dinâmicas e escaláveis na nuvem, com pagamento conforme a demanda. É possível também estender o alcance e a escalabilidade das aplicações existentes, "on-premise".
Você já pode utilizar estes serviços, participando do CTP (Community Technical Preview).
Serão discutidos também serviços de nuvem que estão determinando o futuro dos negócios e da tecnologia.
Assista este webcast para entender o que é Computação na Nuvem e como ela vai impactar sua organização nos próximos anos
INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES NA NUVEMSymantec Brasil
Be Aware Webinar - INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES NA NUVEM
1 CASOS REAIS E ESTATÍSTICAS
2 A CULTURA DA NUVEM E SEUS RISCOS
3 COMO O SYMANTEC DLP PODE AJUDAR
Be Aware Webinar – INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES ...Symantec Brasil
INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES NA NUVEM
1 CASOS REAIS E ESTATÍSTICAS
2 A CULTURA DA NUVEM E SEUS RISCOS
3 COMO O SYMANTEC DLP PODE AJUDAR
Be Aware Webinar acontece todas as quartas às 10h30. Curta nossa página no Facebook e acompanhe a programação.
09.12.2015
Acelerando o desenvolvimento na nuvem com BlueMix e DevOpsFelipe Freire
Em poucos minutos você pode desenvolver uma aplicação com os mesmos padrões e ferramentas utilizados pelas melhores empresas do mundo. Conheça o BlueMix, a implementação da IBM de PaaS, baseada em Cloud Foundry e recheada de serviços criados pela IBM para acelerar o desenvolvimento de aplicações na núvem. Dentre os serviços disponíveis está o DevOps Services que possibilita um eficiente ambiente de desenvolvimento em equipe.
Centenas de clientes da Cisco discutiram as vantagens e desvantagens de priorizar o menor preço na aquisição de um produto ou serviço para sua rede em vez de ter um plano estratégico para a arquitetura da sua interface de rede. Através de interações com diversos desses clientes, nós analisamos vários projetos e implementações de rede.
Nossas conclusões são de que embora haja espaço para construir uma rede tática de baixo custo, as operações contínuas, atualizações e falta de preparo para novos desafios corporativos representam obstáculos para empresas em longo prazo. Em vez de considerarem simplesmente os custos de capital, as empresas devem analisar também os custos de propriedade, incluindo os custos operacionais e o retorno do investimento (ROI), sem esquecer os recursos corporativos que uma rede estratégica pode oferecer, já que ela é construída tendo em vista as necessidades imediatas e futuras de cada empresa. A experiência de clientes e funcionários também deve fazer parte desta equação.
Com o aumento de dispositivos e da demanda por mobilidade, a rede oferece o contexto ideal para garantir conformidade e segurança. Quando combinada à tendência de virtualização e aos serviços de computação em nuvem, a rede torna-se o denominador comum que reúne todos esses sistemas, proporcionando um fluxo consistente de inteligência por toda a rede. Se pensarmos em um futuro com aplicações mais exigentes, como vídeo e virtualização de área de trabalho passando a fazer parte do dia a dia das empresas, a função estratégica da rede torna-se ainda mais crítica. Privilegiar o preço em vez da capacidade e do valor estratégico é uma aposta arriscada e já vimos isso dar errado muitas e muitas vezes.
Blog com todas as actualização disponíve em http://http://office-365-pt.blogspot.pt/
Apresentação do Microsoft Office 365 para o evento online (workshop).
Estratégia da IBM Security Systems para o mercado financeiro. Porfolio de soluções alinhadas com normas e regulamentações do segmento financeiro, Basileia, Banco Central, ISO 27001 e framerowk Cobit.
Digital Summit Brasil 2016 - Tech Trends + Cyber SecurityGustavo de Boer
Rodrigo Mendes, socio da Deloitte apresenta tendencias tecnologias e o futuro do Marketing Digital bem como questões sobre segurança para preparar as empresas para o futuro digital.
Palestra que integra apresentações do WSI Digital Summit 2016 Brasil na Amcham São Paulo ocorrida em 30 de novembro de 2016.
Gestão Ágil de Dados com Enterprise Data FabricDenodo
Watch full webinar here: https://bit.ly/3hkwgM7
Num mundo onde a aprendizagem automática e a inteligência artificial estão a mudar a nossa vida quotidiana, a transformação digital está no topo da agenda estratégica em muitas organizações privadas e governamentais. Os dados estão a tornar-se vitais nas empresas, para permitir percepções empresariais profundas, criar novas oportunidades, e optimizar as operações.
Os Chief Data Officers e os Data Architects estão sob pressão contínua para encontrar as melhores formas de gerir os volumes esmagadores de dados que tendem a tornar-se cada vez mais distribuídos e diversificados. A deslocação física dos dados para um único local para construção de relatórios e análises já não é uma opção - este é um facto aceite pela maioria dos profissionais de dados.
Junte-se a nós neste webinar para conhecer soluções de dados virtuais, incluindo:
- Virtual Data Fabric
- Data Mesh
- Arquitectura híbrida Multi-Cloud
e aprender como aproveitar a plataforma de Virtualização de Dados Denodo para implementar estas arquitecturas de dados modernas.
Uma introdução aos Serviços na Nuvem da Microsoft, com ênfase na Plataforma de Serviços Azure e o novo sistema operacional Windows Azure.
A Plataforma de Serviços Azure fornece uma abrangente gama de serviços na nuvem. Empresas podem utilizá-la para contruir aplicações dinâmicas e escaláveis na nuvem, com pagamento conforme a demanda. É possível também estender o alcance e a escalabilidade das aplicações existentes, "on-premise".
Você já pode utilizar estes serviços, participando do CTP (Community Technical Preview).
Serão discutidos também serviços de nuvem que estão determinando o futuro dos negócios e da tecnologia.
Assista este webcast para entender o que é Computação na Nuvem e como ela vai impactar sua organização nos próximos anos
INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES NA NUVEMSymantec Brasil
Be Aware Webinar - INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES NA NUVEM
1 CASOS REAIS E ESTATÍSTICAS
2 A CULTURA DA NUVEM E SEUS RISCOS
3 COMO O SYMANTEC DLP PODE AJUDAR
Be Aware Webinar – INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES ...Symantec Brasil
INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES NA NUVEM
1 CASOS REAIS E ESTATÍSTICAS
2 A CULTURA DA NUVEM E SEUS RISCOS
3 COMO O SYMANTEC DLP PODE AJUDAR
Be Aware Webinar acontece todas as quartas às 10h30. Curta nossa página no Facebook e acompanhe a programação.
09.12.2015
Semelhante a Apresentação evento lcx tecnologia com sofisticação em f5 (20)
Key Points: Land an emotional connection with the audience around the pains they are feeling today:Aspects of information technology keep growing! We live in a hyper-connected world where people demand access to information on their own terms.Security is so important and challenging than ever as data grows and people access corporate resources on a multitude of devices. Talk Track:Let’s take a look at business today… you and your peers face a lot of challenges… We often hear from our customers that worries of security and compliance keep them up at night. And a valid concern especially as we think about trends such as consumerization of IT. We want to give our company choice and options when it comes to collaboration and getting work done. What this is causing is an incremental increase to the surface area we need to cover – whether the number of email accounts, the ever remote workforce, or the simple fact that data continues to grow at an alarming pace…and at the day we’re ultimately responsible for ensuring an amazing experience to the end user.
Key Points:Companies, and IT leadership want to drive more value out of ITAlignment of IT and Business allows companies to become more agileTalk Track:We spend a lot of time working with customers and understand the pressure that everyone’s under to deliver more value out of existing investments – and the desire to spend less time just keeping the lights on – and more on helping the company grow by delivering valuable services when they’re needed.We hear about the need to provide a secure environment that is designed to scale and help mitigate risks and ensure regulatory compliance. We also hear and know that end users matter more than ever – and are driving a lot of IT requirements and decisions – we’ve got to provide the right level of access to information and applications.
Key Points:Make IT work for you through F5’s intelligent approach to application delivery, security, and deep understanding of Microsoft applications.Simplify your infrastructure through F5’s ability to streamline and automate existing network investments.Accelerate performance of your Microsoft applications.Private cloud done right by giving you cloud reference architectures that provide the right. traffic delivery to avoid application bottlenecks.Easy rollout of Microsoft applications thanks to F5’s deep integration with Exchange, SharePoint, and other mission critical products.Best in class service and support that includes planning and deployment guides, templates, and consulting services and access to an incredible customer and partner community.Talk Track:Transforming IT requires a different take on how infrastructure and applications are designed and delivered. The good news is you most likely already own what you need to get started. We talk about our unique view of the application delivery. F5, since the beginning, has been front and center in terms of application traffic – and over the years we’ve developed a robust app delivery platform that provides incredible visibility how your apps are performing. We strongly believe that to support business objectives the network can no longer be a simple data delivery system – but requires smarts to keep up with the growing mobile user community – new devices – new threats – and to provide the adaptable flexibly to conform to changing business requirements. When it comes to Microsoft applications and technologies, F5 has made SIGNFICANT investments in ensuring that you get fast, available, and secure experiences. Our development teams work together to ensure down to the code level – that our commitment to providing the best possible performance is there. Our deployment guidance for Microsoft’s productivity portfolio, like SharePoint and Exchange are the best in the business. When Microsoft releases a new version, F5 is the first to provide the right details to ensure fast deployments, and deployments done right.
Key Points:We need greater IT agility to respond to business opportunities and to ensure our business and customers are getting the right information when and how they need it.Achieve strategic points of control wherever your information is shared.Exceptions based approach looks for issues and corrects them before they happen.Reduce threats by taking advantage of F5’s built in security capabilities.Get world-class business continuity through F5’s built-in disaster recovery and high availability capabilities.Scale up, out, and down by dynamically updating your network to support changing business needs.Talk Track:Security and compliance are huge. It’s more than a full time job trying to keep up with new security attacks and how to best manage the ever growing IT surface area. At F5 we believe that you can have secure and fast at the same time. We do this by consolidating security at the application layer – giving you incredible control and visibility – WHILE – providing fast application delivery.Right out of the box, you’ll get our years of security expertise that’s been built up supporting some of the world’s largest internet companies and enterprises. Concerns such as high availability, disaster recovery, and datacenter optimization are capabilities built in and intrinsic to F5’s product portfolio.What you might not be aware of is the fact that you can now use your F5 investments as a firewall – allowing you to consolidate your secure systems through F5 – while still benefitting from the incredible Microsoft application delivery capabilities.
Key Points:Be confident that you can take risks without the risk with flexibility and control through F5 revolutionary approach to IT.Accelerate time to market by spending less time deploying applications and more time using them.Ensure regulatory compliance through our comprehensive, scalable proactive approach.Get substantial value out of existing F5 and Microsoft investments so you can reuse existing resources to drive new opportunities.Deliver new application experiences faster by using F5’s built in application resourcesReduce OpEx and CapEx costs by standardizing on F5 systems to support multiple Microsoft application, web, and mobile investments. Talk Track:The deployment of your Microsoft applications shouldn’t be hard – or take an army of consultants to deliver. F5 has taken the trouble and expense of developing substantial deployment guides and best practices for the planning, deployment, and ongoing management of Microsoft applications and technologies. We provide tools and templates that make it easy as one, two, three for your teams to assess your particular needs, design the right approach, and deploy on time and on budget.We believe that your network and development teams should be deeply connected – and have built extensible technologies that your development teams can use to accelerate application development. We provide the connective tissue to your network teams to make it easy to onboard new applications.The bottom line is important – and through consolidation of application delivery and security needs, as well as improved team productivity, your budgetary pressure is relieved.
Key Points:F5 provides serious value to your existing and future Microsoft investmentsOur unique approach to creating intelligence around the application delivery greatly improves app performance, security, and IT productivityTalk Track:We don’t talk often about the expanse of our relationship with Microsoft. F5 sits in front of every major Microsoft strategic initiative – both externally and internally. Microsoft is one of our largest and most strategic customers and partners. We often hear from our Microsoft clients and colleagues that they’ve bet their business on F5 because we provide the strategic point of control for their most critical applications and services, like Office 365 and their internal implementations of SharePoint, Exchange, and other line of business applications. Depend on F5 to be the strategic point of control for your Microsoft investments allowing you to drive your business in new and profound ways. This is possible thanks to our revolutionary approach to intelligent application delivery so your teams are more productive, your apps safer, and possibilities like the web and mobile experiences are within reach.Our unique combination of market leadership, deep integration with Microsoft technologies, and vibrant community allow you and your business to get substantial and unexpected incremental value from our relationship.
This slide speaks for itself…take a moment to pause and discuss with audience how they’ve gotten value out of their F5 | Microsoft investments…
VU#903934Modern web applications include web forms with hundreds of name+value pairs, many of them hidden, that communicate data between the browser and the application. All of these variables are managed, almost universally, by placing them into a language construct called a dictionary. This dictionary is implemented using a hash table, which has all sorts of wonderful characteristics such as fast insertion and fast random lookups that you’d like if you were looking up, say, a word in the dictionary. That hash table, alas, is where the problem comes in.Hash tables are used for high-performance situations because they typically provide the fastest lookup. However, hash tables break down when there are too many hash collisions. Typically, hash collisions in the table are handled by putting a linked list off the hash table and then searching the list. with this attack a mere 30 Kbits/s can keep one Intel™ Core 2 core busy. At 30 Kbits/s a single client can DoS a CPU. An attacker with a gigabit connection could theoretically keep 10,000 Intel™ i7 cores busy.
https://www.whitehatsec.com/assets/WPstats_winter11_11th.pdf?doc=WPstats_winter11_11thBy arranging the time-to-fix data in a cumulative format we get a sense of the time required to remediate vulnerabilities in a given percentage of an industry’s websites. From Figure 6 we can see that number is 116 days. For example, on average 50% of organizations require 116 days or less to remediate their serious* vulnerabilities. The Banking industry is the fastest, remediating 50% of serious issues in under 13 days. The slowest is Telecommunications, which significantly underperforms the overall average, taking 205 days to remediate serious* vulnerabilities on 50% of the websites. This data helps answer a common question, “How fast should our organization be fixing our vulnerabilities?” From a risk management perspective, if the organization is a target of opportunity, perhaps a goal of being at or above average is good enough. If however the organization is a target of choice, either ASAP or being among the fastest is more appropriate Even if serious* vulnerabilities are identified, verified, and explained it does not necessarily mean they are fixed, quickly or at all. As such it is important to analyze the resolution rates of organizations that do get their vulnerabilities fixed, or not, and in what volumes (Figure 7). Some organizations target the easier issues first to demonstrate their progress in vulnerability reduction. Others prioritize the high severity issues to reduce overall risk. Most industries in 2010 fixed roughly half of their outstanding reported issues. What we can also clearly see is a positive historical trend line. A roughly 5% improvement in the percentage of reported vulnerabilities that have been resolved during each of the last three years (2008, 2009, 2010), currently 53%.
Mencionardiferenças de tráfego inbound e outbound, assimcomomencionarquetrabalhamos no tra’fego inbound para as aplicaçõesdentro do data center
Traditional protection methods attempt to piece together many individual point products such as static firewalls, DDoS appliances, DNS appliances, web application firewalls, and application delivery controllers. This approach increases complexity, latency, and adds more points of failure. Worse, this approach fails to integrate information from different attack vectors, and fails to unify the response. Additionally, traditional approaches have no way of evolving as the attacks themselves evolve.The high performance internet firewall firewall builds on F5’s vision of the “dynamic data center” by acting as a strategic point of control for security enforcement from the network to the application layer. (http://devcentral.f5.com/weblogs/macvittie/archive/2010/06/17/what-is-a-strategic-point-of-control-anyway.aspx) Architecting F5 control points throughout the data center, for access, traffic management, acceleration, storage, and security enables a new model for secure application delivery built around the dynamics of the network, data, protocols, applications, and users.
With F5’s IDC Firewall, customers are able to: Reduce hardware and operating cost by as much as 50%Defend against 30+ DDoS attack types across both the network and application layers. Leverage the performance and scalability of BIG-IP to handle 10 times more connections per second over any other network firewall.Protect by using iRules against newly published vulnerabilities that do not have a patch. As in the case of the SSL Renegotiation DOS attack, F5 published on its user community site, DevCentral, a countermeasure within hours of the exploit being published.Scale up to 72 Gbps of throughput with 72 million concurrent connections on a single device.
VU#903934Modern web applications include web forms with hundreds of name+value pairs, many of them hidden, that communicate data between the browser and the application. All of these variables are managed, almost universally, by placing them into a language construct called a dictionary. This dictionary is implemented using a hash table, which has all sorts of wonderful characteristics such as fast insertion and fast random lookups that you’d like if you were looking up, say, a word in the dictionary. That hash table, alas, is where the problem comes in.Hash tables are used for high-performance situations because they typically provide the fastest lookup. However, hash tables break down when there are too many hash collisions. Typically, hash collisions in the table are handled by putting a linked list off the hash table and then searching the list. with this attack a mere 30 Kbits/s can keep one Intel™ Core 2 core busy. At 30 Kbits/s a single client can DoS a CPU. An attacker with a gigabit connection could theoretically keep 10,000 Intel™ i7 cores busy.
With F5 Data Center Firewall, customers are able to: Reduce hardware and operating cost by as much as 50%Defend against 30+ DDoS attack types across both the network and application layers. Leverage the performance and scalability of BIG-IP to handle 10 times more connections per second over any other network firewall.Protect by using iRules against newly published vulnerabilities that do not have a patch. As in the case of the SSL Renegotiation DOS attack, F5 published on its user community site, DevCentral, a countermeasure within hours of the exploit being published.Scale up to 72 Gbps of throughput with 48 million concurrent connections on a single device.Gain visibility and control in to all traffic including SSL.Protect against 30+ DDoS attack types across both the network and application layers. Leverage the performance and scalability of BIG-IP to handle 10 times more connections per second over any other network firewall.Using iRules customers can protect against newly published vulnerabilities that do not have a patch. As in the case of the SSL Renegotiation DOS attack, F5 published on its user community site, DevCentral, a countermeasure (http://devcentral.f5.com/weblogs/david/archive/2011/05/03/ssl-renegotiation-dos-attack-ndash-an-irule-countermeasure.aspx)within hours of the exploit being published.Scalable Performance – Support up to 72 Gbps of throughput with 72 million concurrent connections on a single device.
Talk Track:Ok, let’s drill into the value we provide to your datacenter, and Microsoft technologies…F5, since the beginning, is all about provide fast, secure, and available delivery of your applications and services based upon our market leading flexible and adaptable TMOS system.
Ten-year global partnership dating back to 2001. F5 enjoys a long-standing global partnership with Microsoft, extending the availability, reliability, scalability and security of Microsoft’s enterprise software. Microsoft is also an important F5 customer. Microsoft GNS (global networking services) standardize on F5 as their Tier 1 ADC platform vendor for internal applications. F5 is also core component in the architectural designs for MSN/Live, MSNBC, Xbox Live, BPOS and Azure. F5 is a Microsoft customers, using Windows client/server, Active Directory, MS SQL Server, Office client, Exchange, SharePoint and Office Communications Server (now known as Lync Server).F5 engages in solution development across the Windows platform, business productivity applications, systems management and virtualization. F5 engages during Microsoft design and development, architecting F5 solutions and validating them jointly with Microsoft prior to Microsoft product launch so that customers can deploy them with an F5 solution immediately. For more information: f5.com/microsoftKey alliance memberships such as System Center Alliance and Dynamic Datacenter Alliance represent joint investment, shared thought leadership and strategic planning that ensure customers can confidently invest in both Microsoft and F5 platforms because they work together. The Microsoft Technology Alliance (MTC) is an industry unique program whereby F5 and Microsoft engage customers together to discuss visions, business goals, create architectural designs and even formal proofs of concept. These engagements occur within MTC centers located around the world where F5 has placed BIG-IP ADC equipment for customer testing and solution design verification with Microsoft.F5 educates and trains Microsoft technical field, services and support teams on the BIG-IP platform and F5 solutions for Microsoft applications. Microsoft and F5 also have formal customer support communication and businesses processes in place through TSANET (http://tsanet.org/) and cordial working relationships.F5 maintains offices and lab space in Redmond as part of the Microsoft Partner Solution Center in building 25.https://partner.microsoft.com/40013031http://www.microsoft.com/mtc/default.mspxhttp://www.microsoft.com/serviceproviders/busresources/mpsc.mspx http://www.microsoft.com/hosting/dynamicdatacenter/Alliance.htmlNetworking infrastructure company that builds physical devices for the data center. We currently hold 60% of the ADC market. What this means is that we are the most recognized name with customers for application delivery networking. Our ADC or Application Delivery Controller is a network device that understands the user and application context of the packets flowing through the device and can inspect, modify and manage those packets and proxy the network connections associated with them. F5 devices are commonly known and “BIG-IPs” with sets of features that are enabled through licensing keys which unlock features in the operating system – TMOS (traffic management operating system).In this way F5 helps IT organizations gain more visibility, control and flexibility in managing their IT environments.Gartner’s Magic Quadrant http://www.gartner.com/technology/media-products/reprints/f5networks/vol6/article1/article1.htmlSpecialize in application intelligence, optimizing end-user experience over the network. Load-balancing, acceleration (caching and compression), off-loading, and application (L7) security.62% of IT organizations reduced capital expenditure (CAPEX) by 10% or more for their Microsoft environment using F5 BIG-IP Solutions. TVID: 847-400-62261% of IT organizations reduced operating expenditure (OPEX) by 10% or more for their Microsoft environment using F5 BIG-IP solutions. TVID: 0F1-13A-B2CToday we’re talking with you about optimizing a Microsoft SharePoint 2010 deployment, and we’re proud to say that we’ve been a Microsoft partner since 2001 and as you might expect, are a member of numerous Microsoft alliances and technology-specific partner programs. I’ve listed a few of those here for your easy reference. These alliances represent strategic cooperation between F5 and Microsoft across a number of IT-focused efforts – efforts designed to make the design and deployment of solutions that matter to you both smooth and reliable. For customers investing in the Microsoft platform, F5 delivers a strategic point of control in their data center. Dynamically optimizing user connections to backend applications. F5 invests heavily in understanding the applications and technologies produced by Custom engagement/relationships on-going across Microsoft product teams which drive our solution developmentThought leadership/strategy where we engage in confidential futures discussions and respond to regular Microsoft requests for collaboration, advice on special projects/initiatives (cite the Datacenter Technology Solution Professional training, IIS Web Farm Framework, System Center Virtual Machine Manager 2012 Beta: Load balancer provider which was the only working provider demonstrated at Microsoft Management Summit 2011 in Las Vegas in March and Microsoft Hosting Summit 2011 in Bellevue in March.Full product life cycle integration from early dev/design through release and into support/maintenance. No ADC has more MS application traffic passed through it during dev/test in their own labs than BIG-IP, and F5 trains MS support teams on our gear and our solutions. MS can trouble shoot in their support labs with BIG-IP in the repro.Microsoft and F5 are each other’s customers: providing deep, specific feedback, driving each other’s roadmaps.Microsoft is the only company providing all of these: Hosting centers, Platform as a Service, Infrastructure as a Service, Software as a Service, Operating systems, hypervisor, applications, systems management and monitoring, software development tools and life cycle management, entertainment and gaming. And F5 engages in all these areas, supporting, optimizing, partnering with MS.