Agility 2017

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 1. The worlds first search engine for internet-connect devices
  2. 4. A mechanism whereby a brwoser uses a raw data channel to communicate with a server
  3. 5. F5 REST API Framework
  4. 7. Software used to disrupt a computer and/or gather sensitive data
  5. 8. revolutionary new purpose built security appliance "DDoS hybrid _______"
  6. 10. How unique am I? can my device be distinguished from others?
  7. 11. This very conference
  8. 14. "______ IT" the people who provision Apps and Services without authorisation
  9. 16. How Websafe makes data unintelligible for the fraudsters
  10. 18. Moving multiple Point solutions on to F5 Application Services Fabric
  11. 20. The key management tool on the journey to the Private cloud
  12. 22. Where to store objects for future use
  13. 28. F5's event driven scripting language
  14. 31. What film inspired the naming of F5?
  15. 34. How to get a non-routable protocol over a routed network
  16. 36. A fundemental principle of security to be able to see all your application traffic
  17. 37. An arbitrary number that may only be used once
  18. 39. Leverage machine learning and Data analysis for a new type of DoS mitigation
  19. 42. "App _________" used to dramatically simplify the deliver of services to public cloud apps
  20. 44. American in exile in Russia
  21. 46. "______ authentication" allows a second level of access through APM
  22. 47. used to speed up deployments and streamline operations
  23. 48. The key you don't want anyone to have
Down
  1. 1. "_____engineering" exploits layer 8
  2. 2. F5 Developer community
  3. 3. The best way to secure data in transit
  4. 6. The worlds most programmable cloud ready ADC
  5. 7. The most destruptive botnet created to date
  6. 9. The layer of the OSI model that hackers love to exploit
  7. 12. hackers newest minions are what type of device
  8. 13. How to protect past sessions against future compromises of keys
  9. 15. A combination of multiple Clouds or Consumption models
  10. 17. A free webservice offered by Qualys to check your websites SSL security
  11. 19. Delivering business requirements through infrastructure automation
  12. 21. Ensure point in time data integrity
  13. 23. Using Code to automate tasks
  14. 24. Protects LDNS servers from Cach poisoning and MITM attacks
  15. 25. A secure Key exchange methodology conceptualized by Ralph Merkle
  16. 26. The query response type offered by F5 DNS Express
  17. 27. The key you want everyone to have
  18. 29. F5's all new purpose built security appliances
  19. 30. Journalist recently hit with record DDoS
  20. 32. Unique hardware performance flexibility in the new iSeries appliances
  21. 33. Market leading Cloud-based Application Services Platform
  22. 35. An network built on top of another network
  23. 38. Maximise security strength while minimising key length
  24. 39. Best known form of digital currency
  25. 40. Don't get stung by their App Sec top 10
  26. 41. ASM's automagical system to ensure only human web access "________ Bot Defence"
  27. 42. The algorithm use to disguise data or code
  28. 43. The collaboration of programmers and IT administrators
  29. 45. An attack designed to disrupt the availability of systems or services