Think App Security First: Advanced threats require an advanced WAF VirtualSummit.
News & Events

GCF and Exclusive Networks hold virtual summit on Advanced Web Application Firewall

On March 29, Global CIO Forum in association with Exclusive Networks hosted VirtualSummit on Think App Security First: Advanced threats require an advanced WAF.

In times of rising cyberattacks, organisations need to protect their applications with behavioural analytics, proactive bot defence, and application-layer encryption of sensitive data. F5 helps in protecting business with Advanced Web Application Firewall, WAF, that can improve security posture and save costs.

Not all WAF solutions are the same. While many can help an organisation protect their apps from common and known threats, most are inadequate against the myriad of attacks across the evolving risk landscape. The virtual summit focused on how F5 AWAF introduces unique capabilities to the WAF market.

Speakers at event were Faris AbuJoudeh, Vendor Manager, Exclusive Networks and Serge Ghanem, Technical Solutions Manager, Exclusive Networks ME.


Faris AbuJoudeh, Vendor Manager, Exclusive Networks

Faris AbuJoudeh, Vendor Manager, Exclusive Networks

AbuJoudeh spoke about how digital experience is about delivering a mix of traditional and modern services. Customers demand a high-quality digital experience, but it is full of challenges to deliver such services, he added.

AbuJoudeh highlighted that complex environment, vulnerabilities and limited resources are the challenges in providing digital experience but F5 has come up with a solution that bridges gap between multiple environments.


Serge Ghanem, Technical Solutions Manager, Exclusive Networks ME.

Serge Ghanem, Technical Solutions Manager, Exclusive Networks ME.

Ghanem highlighted that exploitation of APIs and vulnerability of sensitive data are the top challenges for organisations moving to digital transformation. Ghanem covered the key capabilities of Advanced WAF which include threat campaign protection, advanced bot protection, L7 and behaviour-based DoS protection, credential stuffing protection, Client-side credential protections and API protection.

Leave a Reply