Take Off 2017

Thursday 2 February | Exclusive Networks & BigTec Offices

Exclusive Networks and BigTec invite you to a short update session on Thursday 2 February 2017.

Content

  • What's new at BigTec and Exclusive Networks

  • Quick vendor overview & update

  • Quick services overview


Timing

16h00 - 18h00 followed by the New Year Drink


REGISTER HERE

Useful Information When You Need It

Notable Features

Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

ACCURATE ANALYTICS

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

SOCIAL INTERACTION

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

WORLD-WIDE SUPPORT

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

MULTIPLE GAMES

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

ACCURATE ANALYTICS

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

SOCIAL INTERACTION

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

WORLD-WIDE SUPPORT

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

MULTIPLE GAMES

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

BAD ROBOT
don't let bots overwhelm your network

Lunch & Learn | 13 December | Exclusive Networks

Bots are everywhere. Some of them are nice, desirable bots; but many of them are not.

By definition, a bot is a software application that runs automated tasks (scripts) over the Internet. The desirable ones include examples like Google bots. Most people want this…many people even pay huge money to make sure their site is listed in the top results on Google. Other bots, though, are not so good. The more malicious bots are used to attack targets…typically via a Distributed Denial of Service (DDoS) attack. When many bots are controlled by a central bot controller, they form a “botnet” and can be used to send massive amounts of DDoS traffic at a single target. We have seen malicious bot behavior many times, but a recent popular botnet attack was seen by the Mirai botnet against several targets. Let’s just say you didn’t want to be on the receiving end of that attack.

Needless to say, bot activity is something that needs to be monitored and controlled. On one hand, you want the good bots to access your site, but on the other hand you want the bad ones to stay away. The question is, “how do you know the difference?” Great question. And the unfortunate answer for many organizations is: “I have no idea.” The other harsh reality, by the way, is that many organizations have no idea that they have a bot problem at all…yet they have a big one.

BIG-IP ASM includes several bot-defending features, and in this Lunch & Learn session we will also outline a feature called “Proactive Bot Defense." 

Timing

12h30 Welcome & Lunch

13h00 Start Lunch & Learn Session part 1

15h00 Break

15h15 Lunch & Learn Session part 2 + Live Demo

17h00 End

Location

Exclusive Networks
A. Stocletlaan 202
2570 Duffel


 Register Here

Want To Try Us?

Just put your email below
and you'll receive your download link.