New hardware-accelerated solution safeguards applications and the network while delivering superior performance and availability to organizations of any size
STORY HIGHLIGHTS
The DDoS protection solution is one of several reference architectures connected to F5 Synthesis™, the company’s new architectural vision, also announced today. F5 Synthesis comprises a catalog of software defined application services™ (SDAS™) and solutions that enable customers to deliver device, network, and application services without constraints across data center, cloud, and hybrid environments. Supporting these services are multiple reference architectures that give customers prescriptive guidance on how best to implement F5 technology to address specific business challenges.
KEY BENEFITS
SUPPORTING QUOTES
“As an e-commerce hosting company, it’s critical that we deliver
round-the-clock availability while protecting our customers’ websites
from malicious attacks, and we’re easily able to do that with F5. With
our consolidated DDoS, firewall, and load balancing from F5, we saved 70
percent versus buying individual components or using a third-party
mitigation services. And F5 gives us the scalability to go far beyond
the 10, 40, and 100 gigabit speeds of today in a highly available
configuration with no single points of failure.”
“DDoS attack methods have become much stealthier and are increasing in
frequency, volume, and application specificity. To ensure protection
against these threats, organizations should consider a defense-in-depth
posture for DDoS defense. One important component is the on-premises
appliance, key in detecting and mitigating advanced application, SSL,
and volumetric attacks.”
“As F5 brings to market innovative security devices with a range of
performance and scale, they, and also their enterprise customers, need
systems to test and validate those devices. To ensure its BIG-IP
platform offerings can withstand the worst that cyber criminals can
throw at them, F5 thoroughly validates its devices using the Ixia
BreakingPoint security and applications testing platforms, which can
emulate up to nearly a terabit of applications and security attacks.”
“Our new solution makes DDoS mitigation affordable for companies of any
size. It delivers the most comprehensive DDoS protection suite of
services in the marketplace, provides superior performance results
across 25 hardware-accelerated attack vectors, and frees up resources
that can be dedicated to providing other security services.
Software-only solutions are an excellent choice for certain types of
network needs, but when it comes to averting volumetric DDoS attacks,
there’s no disputing the advantages of a hardware-accelerated solution.”
AVAILABILITY
The F5 solution referenced in this announcement is available today. Contact your local F5 sales office for availability in specific countries.
SUPPORTING RESOURCES
ABOUT F5
F5 (NASDAQ: FFIV) provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends. For more information, go to f5.com.
You can also follow @f5networks on Twitter or visit us on Facebook for more information about F5, its partners, and technologies. For a complete listing of F5 community sites, please visit www.f5.com/news-press-events/web-media/community.html.
F5, BIG-IP, F5 Synthesis, software defined application services, SDAS,
and VIPRION are trademarks or service marks of
This press release may contain forward looking statements relating to
future events or future financial performance that involve risks and
uncertainties. Such statements can be identified by terminology such as
"may," "will," "should," "expects," "plans," "anticipates," "believes,"
"estimates," "predicts," "potential," or "continue," or the negative of
such terms or comparable terms. These statements are only predictions
and actual results could differ materially from those anticipated in
these statements based upon a number of factors including those
identified in the company's filings with the
a.moran@f5.com
or
troy.edwards@porternovelli.com
Source: