Across
- 1. The worlds first search engine for internet-connect devices
- 4. A mechanism whereby a brwoser uses a raw data channel to communicate with a server
- 5. F5 REST API Framework
- 7. Software used to disrupt a computer and/or gather sensitive data
- 8. revolutionary new purpose built security appliance "DDoS hybrid _______"
- 10. How unique am I? can my device be distinguished from others?
- 11. This very conference
- 14. "______ IT" the people who provision Apps and Services without authorisation
- 16. How Websafe makes data unintelligible for the fraudsters
- 18. Moving multiple Point solutions on to F5 Application Services Fabric
- 20. The key management tool on the journey to the Private cloud
- 22. Where to store objects for future use
- 28. F5's event driven scripting language
- 31. What film inspired the naming of F5?
- 34. How to get a non-routable protocol over a routed network
- 36. A fundemental principle of security to be able to see all your application traffic
- 37. An arbitrary number that may only be used once
- 39. Leverage machine learning and Data analysis for a new type of DoS mitigation
- 42. "App _________" used to dramatically simplify the deliver of services to public cloud apps
- 44. American in exile in Russia
- 46. "______ authentication" allows a second level of access through APM
- 47. used to speed up deployments and streamline operations
- 48. The key you don't want anyone to have
Down
- 1. "_____engineering" exploits layer 8
- 2. F5 Developer community
- 3. The best way to secure data in transit
- 6. The worlds most programmable cloud ready ADC
- 7. The most destruptive botnet created to date
- 9. The layer of the OSI model that hackers love to exploit
- 12. hackers newest minions are what type of device
- 13. How to protect past sessions against future compromises of keys
- 15. A combination of multiple Clouds or Consumption models
- 17. A free webservice offered by Qualys to check your websites SSL security
- 19. Delivering business requirements through infrastructure automation
- 21. Ensure point in time data integrity
- 23. Using Code to automate tasks
- 24. Protects LDNS servers from Cach poisoning and MITM attacks
- 25. A secure Key exchange methodology conceptualized by Ralph Merkle
- 26. The query response type offered by F5 DNS Express
- 27. The key you want everyone to have
- 29. F5's all new purpose built security appliances
- 30. Journalist recently hit with record DDoS
- 32. Unique hardware performance flexibility in the new iSeries appliances
- 33. Market leading Cloud-based Application Services Platform
- 35. An network built on top of another network
- 38. Maximise security strength while minimising key length
- 39. Best known form of digital currency
- 40. Don't get stung by their App Sec top 10
- 41. ASM's automagical system to ensure only human web access "________ Bot Defence"
- 42. The algorithm use to disguise data or code
- 43. The collaboration of programmers and IT administrators
- 45. An attack designed to disrupt the availability of systems or services
