New application delivery firewall solution safeguards customers’ applications, data, and users and provides industry-leading performance
When deployed with F5’s new VIPRION® 4800 hardware, the F5® application delivery firewall solution provides performance levels well beyond what other vendors can offer, including:
Details
By consolidating the network and security functions of several BIG-IP® modules into an integrated solution, F5 helps organizations reduce management complexity and overhead, while maintaining superior performance and scalability. In support of the F5 application delivery firewall solution, today’s announcement marks significant milestones from a product perspective, including:
At the core of F5’s application delivery firewall solution, the BIG-IP Advanced Firewall Manager product is an innovative network firewall built on full-proxy architecture to provide outstanding security. By orienting application security around the applications themselves, F5’s approach simplifies firewall policy management. This application-centric security model leverages F5’s industry-leading application delivery capabilities and intelligence to enhance customers’ overall security posture, while alleviating the complexity associated with mapping application infrastructure to static constructs such as traditional firewall zones.
With support for SAML 2.0, F5 now offers improved single sign-on (SSO) capabilities for web-based, VDI, and client/server applications—whether hosted in corporate data centers or the cloud. In addition, BIG-IP APM offers identity federation across multiple product instances within an organization, reducing the number of passwords needed by users to access corporate applications. Managing credentials in this way helps customers mitigate security risks and reduces the burden of administrative tasks on IT personnel.
BIG-IP ASM includes several new functions to help businesses strengthen their security posture for web applications and address evolving threats. BIG-IP ASM now features support for applications written with the Google Web Toolkit, meaning security teams can enforce application security policies that use this widely adopted framework. Additionally, BIG-IP ASM can better detect and mitigate clickjacking, a growing web threat that attackers use to trick others into revealing personal information.
“Increasingly, we’re seeing organizations grapple with attacks that
target applications, in addition to more conventional network and
perimeter threats,” said
Unifying Application Delivery and Firewall Security in an Intelligent Services Framework
To support individual and comprehensive security initiatives, F5’s integrated approach to security enables customers to tailor their environments to address particular needs and priorities. F5’s customizable solutions help organizations:
With the industry-leading performance of F5 solutions, customers can meet the rising demands driven by increasing numbers of mobile devices and web applications. F5® solutions also provide the processing power to guard the most demanding data centers against denial of service attacks (both volumetric and resource exhaustion threats)—even when those attacks are embedded within SSL.
F5 products provide customers with secure access to business-critical applications as well as protection from large-scale attacks such as distributed denial of service (DDoS). During a DDoS attack, a customer’s site is inundated with requests from multiple origins in an attempt to overload servers. To mitigate such threats, F5 devices can help identify malicious actions, prioritize how requests from specific locations are handled, and focus on addressing properly qualified requests.
By aligning firewall security and access policies with the specific applications that organizations rely on, management of security-related rules, actions, and permissions can be simplified considerably with F5’s application delivery firewall. Further, F5’s integrated solutions provide sophisticated logging and reporting capabilities that can be customized on a per-application basis across the application delivery infrastructure. This means that network, application, and security teams can easily access the security logs relevant to their tasks without having to rely on a single global logging system for all events. This level of granularity helps organizations and teams improve compliance and planning efforts, while streamlining the monitoring of application, network, and security events. In addition, controlling and logging access to sensitive web-based applications can be unified across private and public clouds with identity federation, consolidating password management and reducing the time IT spends on repetitive tasks.
Supporting Quotes
“F5 is leveraging its strength in application delivery to extend into
the firewall market, using its products’ ability to understand and
optimize web traffic,” said
“In adding to its slate of security offerings, F5 is broadening the
number of compelling, integrated solutions we can offer to clients,”
said
“Enterprises and service providers are incorporating identity federation
to support SSO in growing numbers,” said
Availability
All F5 solutions mentioned in this announcement will be orderable in
Additional Resources
About
You can also follow @f5networks on Twitter or visit us on Facebook for more information about F5, its partners, and technology. For a complete listing of F5 community sites, please visit www.f5.com/news-press-events/web-media/community.html.
F5, BIG-IP, Advanced Firewall Manager, AFM, VIPRION, Access Policy
Manager, APM, Application Security Manager, and ASM are trademarks or
service marks of
This press release may contain forward-looking statements relating to
future events or future financial performance that involve risks and
uncertainties. Such statements can be identified by terminology such as
“may,” “will,” “should,” “expects,” “plans,” “anticipates,” “believes,”
“estimates,” “predicts,” “potential,” or “continue,” or the negative of
such terms or comparable terms. These statements are only predictions,
and actual results could differ materially from those anticipated in
these statements based upon a number of factors, including those
identified in the company’s filings with the
a.moran@f5.com
or
hollyh@connectpr.com
Source: