Press Releases Archive   Search Press Releases
Press Release

F5 Networks Announces the New Dynamic Security Control Architecture for Centralized Enforcement of Application Level Security

Powerful, multi-tiered security architecture provides a unified line of defense to ensure continuous protection and high availability of enterprise, mobile and web services applications

F5 Networks, Inc. (NASDAQ: FFIV), the leading provider of Application Traffic Management products, today introduced its Dynamic Security Control Architecture (DSCA), a powerful security structure that provides a coordinated and unified line of defense to protect enterprise, mobile and web services applications. Through this unique architecture, the BIG-IP device is the first networking solution that facilitates centralized application security enforcement. By combining the expertise of specialized security devices and applications and acting on their behalf, the BIG-IP solution can automatically respond to, act on and prevent against changing application level security requirements. Through its new Dynamic Security Control capabilities, the BIG-IP solution plays a vital role in keeping the network and security services available and performing efficiently at all times.

"Strong perimeters and internal monitoring are no longer sufficient for robust enterprise network and application security," said Richard Stiennon, research director, network security, Gartner. "To ensure security services are never down and are able to keep up with traffic flows, enterprises should be looking to shield their specialized security devices from unwanted traffic. Ultimately, this helps reduce false positive alarms and makes the network better able to react to changing security threats."

Enterprises can use the BIG-IP solution, in combination with specialized security applications or devices, to set up and enforce common application level security policies using the BIG-IP products' Universal Inspection Engine™ (UIE) and iRules™ to filter and block application level attacks and threats. Through BIG-IP's iControl API, specialized security devices and applications can directly communicate their knowledge to the BIG-IP device by creating, deleting or editing iRules, which alter how BIG-IP handles traffic. This functionality can be used to secure web services, mobile applications and nearly any IP-based enterprise application. The result is an automated response, action and prevention architecture to address continuous security threats.

Through a combination of software and hardware, F5's DSCA is able to enforce user access security policies, fortify a site from cyber attacks, and accelerate/off-load SSL transactions from web and application servers. By leveraging F5's open iControl™ API (application programming interface) and communicating with the BIG-IP device, specialized security devices such as firewalls and IDS systems can now take an active role in shaping network traffic. The BIG-IP product combines the expertise of specialized devices and acts on their behalf to provide a coordinated and unified line of defense. Through its Intelligent Port Mirroring capabilities, the BIG-IP device directs traffic to the appropriate security device without disrupting the flow of traffic for intrusion detection, mail scanning, virus checking and other application level security services.

F5 security partners view F5's Dynamic Security Control Architecture as an innovative and important development in helping clients secure their applications and networks together as part of an integrated information architecture. "As the leading provider of security infrastructure, Nokia Internet Communications recognizes the need to provide integrated solutions for securing business applications and web services," said Dan MacDonald, vice president of product management and marketing, Nokia Internet Communication. "F5's dynamic security control architecture further enhances the synergies between F5's layer 2-7 traffic management and Nokia's security systems for today's enterprise and mobile applications."

"With AppShield seamlessly integrating into new and existing F5 deployments, our mutual customers can achieve high speed performance without compromise to application-level security," said Gili Raanan, senior vice president of products, Sanctum Inc. "We are delighted to be working with F5 to provide the marketplace with an enhanced level of application security, as well as increased availability and performance."

"Our clients are systematically reducing their risk profile by leveraging Securify's intuitive policy development environment and real-time monitoring capabilities to ensure their applications and network assets are operating within their proprietary security policies," said John Mahlmeister, vice president corporate development, Securify. "Armed with information from SecurVantage regarding how their network assets are behaving, customers can leverage F5's iRules and Universal Inspection Engine to ensure the BIG-IP device allows only authorized traffic on their network. The combination of our solutions offers compelling customer advantages and we're pleased to support F5's introduction of its new generation of the BIG-IP family and security framework."

Availability

F5's Dynamic Security Control Architecture is part of BIG-IP software version 4.5, which will be available in October. Customers should contact their local reseller for more specific details regarding product availability and pricing. Standard reseller discounts apply.

About F5 Networks

F5 Networks is the Industry leader in Application Traffic Management, enabling enterprises and service providers to optimize any mission-critical application or web service, providing secure and predictable delivery of application traffic in an unpredictable environment. Through F5's unique open iControl™ API, third party applications and network devices can take an active role in shaping network traffic, delivering application aware networks that allow customers to direct traffic based on their exact business requirements. Our solutions optimize the availability, security and speed of mission-critical servers and applications, including enterprise applications, web services, mobile IP applications, web publishing, content delivery, e-commerce, caching, firewalls and more. F5's solutions are widely deployed in large enterprises, the top service providers, financial institutions, government agencies, healthcare, and portals throughout the world. The company is headquartered in Seattle, Washington, and has offices throughout North America, Europe Japan and Asia Pacific. F5 Networks is located on the web at www.f5.com.

About F5

F5 (NASDAQ: FFIV) provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends. For more information, go to .

You can also follow @f5networks on Twitter or visit us on Facebook for more information about F5, its partners, and technologies.

F5, BIG-IP, Access Policy Manager, Global Traffic Manager, and Software Defined Application Services are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.

# # #

This press release may contain forward looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC.

TAGS: