If you are who you say you are.
I’ve been travelling the last few weeks shooting some videos for VMware PEX and RSA. When that happens, my browser tabs get crowded with the various stories I’m interested in but will read later. This time they all seemed to hover around Identity Theft. When I got home, in my awaiting physical mail was a letter from Target. I also returned something to a national hardware store and the cashier tried to crumple my credit-card-info-having receipt into a trash can. Kismet.
Let’s take a look…
Crazy that this is the 20th installment of the Outtakes. We shot 10 videos this week and often, it did not go as planned. Here are our mistakes, flubs and fun.
I wrap it up from RSA 2014. Special thanks to F5’ers Mark DiMinico, Joel Moses, Ken Bocchino, Bob Blair, Corey Marshall and Michael Koyfman along with Chris Thomas of CARFAX and Jeremiah Grossman of WhiteHat Security. Also thanks to Eric, Mark, Jay, Cecile and Natasha for their camera work! Reporting from San Francisco!
We are at it again! For the 4th year in a row, Jeremiah and I chat in our annual RSA video catch up. I get some interesting security insight from WhiteHat Security Founder & CEO Jeremiah Grossman. We touch on web vulnerabilities, mobile apps, why SQLi and XSS is still a problem for organizations, WhiteHat’s Aviator secure browser along with some business advice for those entrepreneurial technologists looking to jump start their start-ups. Always a fun and interesting conversation with Jer.
While protecting employees from rogue sites and productivity hogs is critical, the employee’s ability to access SaaS applications is also critical for productivity. Sr. Global Security Solutions Architect Michael Koyfman shows how to layer SAML federated identity to Secure Web Gateway.
With software defining everything these days, Corey Marshall, F5 Security Solution Architect, discusses F5 API’s and how they integrate with other technology solutions. He talks about iCall, iRules, iControl and iApps and where each is applicable. BIG-IP Programmability.
With the hum of a VIPRION as a backdrop, Chris Thomas, Network Manager for CARFAX, stops by F5’s RSA booth to talk about how CARFAX uses BIG-IP to secure their data, consolidate their infrastructure, and helps Chris sleep at night. CARFAX is the most trusted provider of vehicle history information, CARFAX is used by millions of consumers each year.
Bob Blair, F5 Sr Product Management Engineer, explains to me how to build high performance IPS architecture through the integration of F5’s and Cisco Sourcefire security solutions.
F5 Sr. Systems Architect Ken Bocchino shows me a live demonstration of how F5’s protects the fundamental elements of an application (network, DNS, SSL and HTTP) against aggressively evolving DDoS attacks. Ken is always a fun and interesting guest.
I grab Joel Moses, Director Product Management Engineering, to understand how F5 simplifies web security policy creation, protects enterprises and employees from web threats, malware, and data loss. Secure Web Gateway protects your organization by validating the integrity of users and their devices as well as the Internet sites that users are accessing. Joel gives a great demo and explains the benefits of the solution.
I meet with Mark DiMinico, F5 FSE, to see how F5’s new Anti-Fraud solution works. Mark shows how F5’s advanced fraud protection offers real-time security against multiple fraud threat vectors, preventing attackers from spoofing, disabling, or otherwise bypassing security checks.
The F5 Web Fraud Protection solution helps financial institutions protect their customers from the rise of phishing attacks, malware, and automated transactions; the techniques used by fraudsters to steal information, money, and peace-of mind.
In his 250th F5 video, Peter Silva shows you how to find F5 booth 1801 at the 2014 RSA Conference in San Francisco. After talking about the show theme, how F5 Synthesis can help and showing off some of the F5 trinkets, he closes with a rousing, way off-key rendition of the Looney Tunes classic, This is It!
Desktop and endpoint device management has long been a challenge for IT. People demand flexibility, multiple access options, and desktop customization, while business groups often require multiple desktop types based on business and/or technical requirements. This sour mash of devices can be a major management headache. Add in support for all the different desktop/laptop needs and desktop management can all but consume IT.
Everyone loves bloopers so here are your Valentine’s Friday Funnies of the video bloopers, flubs and fun from the VMware Partner Exchange 2014. The last one is the best.
I wrap it up from VMware PEX 2014 in San Francisco. Special thanks to Frank Strobel, Paul Pindell and Charlie Cano for being guests along with Courtney and Nathan for their camera work. Reporting from across the bay in Sausalito, thanks for watching!