www.f5.com
Open in
urlscan Pro
2600:9000:2156:2200:14:232e:8a00:93a1
Public Scan
Submitted URL: https://buzz.f5.com/NjUzLVNNQy03ODMAAAGD3y3HrbZvx4R94mx0qg_6GSlq93ZqD5O9UK9mQcJdt4WkVc-wjfiEWU87pmeF_b-9PY3Mr0A=
Effective URL: https://www.f5.com/c/emea-2022/event/myforum-securing-your-cloud-native-5g-core?utm_medium=email&utm_source=f5db&ut...
Submission: On April 19 via api from SE — Scanned from DE
Effective URL: https://www.f5.com/c/emea-2022/event/myforum-securing-your-cloud-native-5g-core?utm_medium=email&utm_source=f5db&ut...
Submission: On April 19 via api from SE — Scanned from DE
Form analysis
2 forms found in the DOM<form class="mktoForm mktoHasWidth mktoLayoutLeft" data-formid="16751" id="" novalidate="novalidate" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 541px;">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
color: #fff;
border: 1px solid #75ae4c;
padding: 0.4em 1em;
font-size: 1em;
background-color: #99c47c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
outline: none;
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
background-color: #75ae4c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
}
</style>
<div class="mktoTemplateBox">
<div class="known-user-message">
<h2 style="margin-bottom: 20px;">Welcome back, Alessandro Sabelli</h2>
<p style="margin-bottom: 20px; font-size: 1rem;">Click the button below to register for the live session and be contacted about F5 products and services.<br></p>
<p class="mktoButtonWrap mktoSimple" style="margin-bottom: 20px;"><span class="mktoButtonWrap mktoSimple"><button type="submit" class="mktoButton">Submit</button></span></p>
<p class="not-you">Not you? <a class="mktoNotYou">Click here to reset the form.</a></p>
</div>
</div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor" value="16751"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="653-SMC-783">
</form>
<form class="mktoForm mktoHasWidth mktoLayoutLeft" data-formid="16751" novalidate="novalidate"
style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>
Text Content
Skip to main content Skip to footer Skip to search ® * Solutions & Products * Partners * Resources * Support * Company * Get F5 * EN * EN * DE * ES * FR * 中文 * 日本語 * Mobile Nav Open * Search * DevCentral * Support * Partners * MyF5 * Contact F5 * Solutions & Products * Partners * Resources * Support * Company * Get F5 * DevCentral * Support * Partners * MyF5 * Contact F5 EN * EN * DE * ES * FR * 中文 * 日本語 LIVE SESSION SECURING YOUR CLOUD-NATIVE 5G CORE WELCOME BACK, ALESSANDRO SABELLI Click the button below to register for the live session and be contacted about F5 products and services. Submit Not you? Click here to reset the form. Thank you. Your session access will be delivered to your inbox shortly. If you have access issues, please email thef5team@f5.com. EXPLORE SESSIONS LIVE SESSION DETAILS: Date: Thursday, May 12, 2022 Time: 10:00 - 11:00 AM BST Service providers are increasingly deploying cloud-native 5G core networks on top of a Kubernetes-based platform stack. As new technologies, both 5G and Kubernetes introduce their own security challenges. Standard Kubernetes platforms are IT centric by nature and are lacking functions that are required in the telco environment. In this session our experts will explain how Kubernetes-based 5G networks can be organised in security zones and safely connected to external networks, such as legacy 4G, public Internet, and roaming partners. You will learn: * Best practices for 5G core design with security zones * The gaps in standard Kubernetes required for 5G traffic management and security * Managing and securing traffic between Cloud-Native Network Functions (CNFs) from different vendors * 5G security recommendations from 3GPP and GSMA -------------------------------------------------------------------------------- PRESENTER Peter Nas Senior Product Management Engineer MODERATOR Andrew Bargery Solutions Architect SECURE AND DELIVER EXTRAORDINARY DIGITAL EXPERIENCES F5’s portfolio of automation, security, performance, and insight capabilities empowers our customers to create, secure, and operate adaptive applications that reduce costs, improve operations, and better protect users. -------------------------------------------------------------------------------- HAVE A QUESTION? Support and Sales › FOLLOW US * Twitter * LinkedIn * Facebook * YouTube * DevCentral -------------------------------------------------------------------------------- 48 of the Fortune 50 rely on F5 76 offices in 43 countries 20 plus years protecting apps -------------------------------------------------------------------------------- ABOUT F5 * Corporate Information * Newsroom * Investor Relations * Careers * Contact Information * Communication Preferences * Product Certifications * Diversity & Inclusion EDUCATION * Training * Professional Certification * LearnF5 * Free Online Training * F5 SITES * F5.com * DevCentral * Support Portal * Partner Central * F5 Labs * NGINX * Shape Security * Volterra ©2022 F5, Inc. All rights reserved. * Trademarks * Policies * Privacy * California Privacy * Do Not Sell My Personal Information * Cookie-Präferenzen