WELCOME TO

EXCLUSIVE NETWORKS

Staying ahead of change to build channel market success

Your Trusted IT Security Value Added Distributor

WHY EXCLUSIVE?

Global IT opportunities, consumption models and cyber threats are constantly evolving.
We’re here to lead the pack.

Insights

Discover what’s driving the global market for disruptive cybersecurity, networking and infrastructure technologies.

The Exclusive Story

Value-added distribution isn’t what it used to be. As a market leader we have recognised this from the offset. We’ve never stopped redefining value; pushing the market; innovating for our partners.

We’ve always believed that a strong business needs new technologies and new services. They need an edge.

It’s not the strongest species that survives but those who adapt to change

Charles Darwin

So disrupt or be disrupted.

FIND OUT MORE

Latest News

  • fav FOCUSED VAD PLAYER - Bahi Hour, technical director, Exclusive Networks, on how the company is evolving its distribution model. What is your company’s core business and how does it define itself? We identify ourselves as a super value-added distributor (VAD) for cyber security solutions, networking and Infrastructure technologies. As a distributor, Exclusive Networks accelerates market entry and growth for
  • fav Exclusive Group announces 2015 financial results - Exclusive Group has announced an underlying organic growth of 31 percent and total pro forma annualised revenues of EUR 1.04 billion for 2015. According to the company, the results prove the success of its value-centric approach, relentless focus on cybersecurity and data centre transformation opportunities, and astute acquisition strategy. The performance underlines the Group’s momentum
  • fav Exclusive Group Breaks the Billion with Biggest Acquisition: Transition Systems Asia - Purchase of Singapore based VAD extends global footprint in APAC; Delivers combined revenues of >1bn€ LONDON, UK & SINGAPORE – January 12th 2016 – Exclusive Group, the global value-added services and technologies (VAST) group, today announced the acquisition of Singapore HQ’d cybersecurity and infrastructure VAD, Transition Systems.  The acquisition, the largest in its history, adds

Upcoming Events

Dec
12
Mon
F5 Big-IP Application Security Manager (ASM) V12 @ Dubai, UAE
Dec 12 @ 9:00 am – Dec 15 @ 5:00 pm
F5 Big-IP Application Security Manager (ASM) V12 @ Dubai, UAE

F5 Big-IP Application Security Manager (ASM) V12

The BIG-IP Application Security Manager course gives participants a functional understanding of how to deploy, tune, and operate BIG-IP Application Security Manager (ASM) to protect their web applications from HTTP-based attacks.

The course includes lecture, hands-on labs, and discussion about different ASM components for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day.

The BIG-IP Application Security Manager course provides participants with the expertise needed to detect, mitigate, and prevent HTTP-based attacks on web applications. The four-day lab intensive course starts at the simplest level for quickly configuring and implementing an application security policy and progresses through more complex configurations. The course includes detailed analysis and hands-on exercises for protecting web applications from brute force, web scraping, layer 7 DDoS, and other current attack vectors.

After course completion, participants will be able to differentiate between negative and positive security models, and configure the most appropriate protection for their own web applications

Topics covered in this course include:

Setting up the BIG-IP system
Traffic processing with BIG-IP Local Traffic Manager (LTM)
Web application concepts
Web application vulnerabilities
Security policy deployment
Attack signatures
Positive security building
Cookies and other headers
Reporting
User roles and administration
Advanced parameter handling
Application templates
Real Traffic Policy Builder
Vulnerability scanners
Login enforcement and session tracking
Anomaly detection
ASM and iRules
AJAX and JSON support
XML and web services support
Course length: 4 days

Audience

This course is intended for security and network administrators who will be responsible for the installation and day-to-day maintenance of the Application Security Manager.

Prerequisites

Students should be familiar with the F5 BIG-IP Product Suite and, in particular, how to setup and configure a BIG-IP LTM system, including virtual servers, pools, profiles, VLANs and self-IPs.

There are no required F5 prerequisites for this course, but completing one of the following before attending would be very helpful for students unfamiliar with BIG-IP:

Administering BIG-IP V11 instructor-led course
F5 Certified BIG-IP Administrator
In addition, the following web-based courses will be very helpful for any student with limited BIG-IP administration and configuration:

Getting Started with BIG-IP web-based training
Getting Started with BIG-IP Application Security Manager (ASM) web-based training

Students should understand:

TMOS administration
Network concepts and configuration
Programming concepts
Security concepts and terminology
Web application delivery

Home