Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of F5
Forums it-sa Expo Knowledge Forum A

Genesis Legacy: From hacker to hacked - on the trail of a bot

The live demo will highlight potential attacks and the associated risks, as well as effective and unique defenses.

calendar_today Wed, 11.10.2023, 15:00 - 15:30

event_available On site

Action Video

south_east

Action description

south_east

Speaker

south_east

Product

south_east

Themes

Awareness / Phishing / Fraud Cloud Security Identity and access management Network Security / Patch Management Websecurity / VPN Trend topic

Key Facts

  • Bot-Defense
  • Layer7 DDos
  • User Identity Protection/ User Account Protection

Organizer

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

The pandemic has forced many companies to consider new "digital business models" and adapt their ways of working. Employees have been sent to the home office, the world has become many times more digital in a very short time, and users and customers are accessing sensitive data remotely via a wide variety of devices.

User accounts, or the authentication to access them, are the new perimeter and thus also increasingly the target of attacks. Messages such as "user account taken over" or "user locked out" are part of everyday life. Fake user accounts" are created and, for example, tickets or coveted new retail releases are ordered online at the expense of others, resulting in high financial losses.

These and many other reports can now be found regularly in the media, and there is no end in sight. Attackers are using ever more intelligent tools for their schemes, which at the same time makes them increasingly difficult to detect.

Efficient and reliable differentiation between "real" and "fake" clients and users is crucial for access and, in addition to protecting the user accounts or the data behind them, also enables pleasant and hurdle-free use of the applications.

... read more

Language: German

Questions and Answers: No

Products

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.