Fine grained access control and audit trail mandates are extending broadly across the government and reaching into the system integrator community. New mandates call for use of CAC/PKI for administrative control of network infrastructure within system integrator and client internal systems. Addressing these issues has proven to be a challenge.
Key points included:
Identity federation for secure (CAC/PIV) access to cloud based apps/services
Compliance requirements for FSI protection of government client information within nonfederal systems
Tools for simplified compliance with DISA Network Device Management SRG
Fill out the form below to view this archived event.
BIG-IP® Access Policy
Manager® (APM) is a flexible, high-performance access and security solution
that provides unified global access to your applications and network. By
converging and consolidating remote access, LAN access, and wireless
connections within a single management interface and p...
F5® BIG-IP® Global Traffic
Manager™ (GTM) distributes DNS and user application requests based on business
policies, data center and network conditions, user location, and application
performance. BIG-IP GTM delivers F5’s high-performance DNS Services with
visibility, reporting, and analysi...
F5® BIG-IP® Local Traffic
Manager™ (LTM) helps you deliver your applications to your users, in a
reliable, secure, and optimized way. You get the extensibility and flexibility
of application services with the programmability you need to manage your
physical, virtual, and cloud infrastructure...
Application Security Manager™ (ASM)
is a flexible web application firewall that secures web applications in
traditional, virtual, and private cloud environments. BIG-IP ASM helps secure
applications against unknown vulnerabilities and enables compliance for key
F5® Silverline™ Web Application Firewall is a cloud-based service built on BIG-IP® Application Security Manager™ (ASM) – with 24x7x365 support from highly specialized security experts to help organizations protect web applications and data, and enable compliance with industry security standa...
A staple of organizations worldwide, Microsoft Office has long been one of the most popular business productivity software suites. Cloud-based Office 365, Microsoft's subscription-based access to its well-known applications, has been adopted by organizations of all sizes to increase user productivit...
With predictions of 30–50 billion Internet-connected devices by 2020, the need to provide end-to-end
encryption in a secure and scalable manner is critical for the protection of next-generation data centers
Federal IT organizations have never faced more difficult challenges: cyber attacks,
the mobile revolution, data center consolidation, cloud deployments, complex
application environments, and constantly increasing network traffic. And, at the
heart of it all, budget constraints demanding smart, af...