May 20, 2021

Modernizing Legacy Applications for a Zero Trust World

Presented by

Don Bilbrey, Senior Cloud Architect, SSTech; Lee Markham, Engagement Consultant, F5; Greg Coward, Solutions Architect, F5

About this talk

Learn How Smart Companies Secure Their Legacy Applications by Simplifying Logins with Security Assertion Markup Language (SAML).

As our clients—and the customers they serve—consume more cloud services integrated with legacy applications, the need for a unified cloud identity model and better security becomes vital in this Zero trust world. Managing access to critical applications and data based on complex architectures can be expensive and fraught with risk. Other trends that challenge business and IT leaders include:

  • Expanded attack surfaces from growth of remote-based workforces, which rely on difficult-to-control technology (mobile, desktop, Apple, many versions of Windows) accessed from diverse geographic locations.
  • More rogue actors and increased security breaches, including severe penalties for those who fail to protect customer privacy and data.
  • Broader use of complex architectures based on hybrid environments that integrate private and public clouds with legacy applications and data.

During this webinar, you will learn how SSTech, in combination with F5 BIG-IP Access Policy Manager (APM), has helped customers overcome these challenges in this Zero trust world:

  • Centralizing identity and access control with application-aware policies.
  • Unifying access controls in one simple dashboard.
  • Saving costs by reducing multi-tier proxies.
  • Strengthening security through comprehensive endpoint posture and automated penetration testing.
  • Reducing website exposure with intelligent Forcepoint technology.
  • Achieving high performance at scale.

We will share case studies about top performers overcoming challenges to secure their complex hybrid platform. F5 will co-host, demonstrating APM and providing specific recommendations and techniques in pragmatic terms.