Bots are everywhere. Some of them are nice, desirable bots; but many of them are not.
By definition, a bot is a software application that runs automated tasks (scripts) over the Internet. The desirable ones include examples like Google bots. Most people want this…many people even pay huge money to make sure their site is listed in the top results on Google. Other bots, though, are not so good. The more malicious bots are used to attack targets…typically via a Distributed Denial of Service (DDoS) attack. When many bots are controlled by a central bot controller, they form a “botnet” and can be used to send massive amounts of DDoS traffic at a single target. We have seen malicious bot behavior many times, but a recent popular botnet attack was seen by the Mirai botnet against several targets. Let’s just say you didn’t want to be on the receiving end of that attack.
Needless to say, bot activity is something that needs to be monitored and controlled. On one hand, you want the good bots to access your site, but on the other hand you want the bad ones to stay away. The question is, “how do you know the difference?” Great question. And the unfortunate answer for many organizations is: “I have no idea.” The other harsh reality, by the way, is that many organizations have no idea that they have a bot problem at all…yet they have a big one.
BIG-IP ASM includes several bot-defending features, and in this Lunch & Learn session we will also outline a feature called “Proactive Bot Defense.”
12h30 Welcome & Lunch
13h00 Start Lunch & Learn Session part 1
15h15 Lunch & Learn Session part 2 + Live Demo
A. Stocletlaan 202
|13/12/2018||12:30 to 17:00||Exclusive Networks|