In a world where hybrid work has become the new standard, enterprises and public sector organizations face the challenge of providing fast, reliable, and secure access to applications and desktops—without sacrificing scalability or performance.
Kasm Technologies and F5 have partnered to deliver a zero trust, high-performance virtual desktop access solution that meets these demands head-on.
This integrated solution combines:
- Kasm Workspaces: A modern, container-native platform for streaming desktops and applications directly to the browser—enabling flexible, secure, and scalable remote work environments.
- F5: A market-leading platform for advanced application delivery, traffic management, and security, including web application firewall (WAF), SSL inspection, and identity-aware proxy capabilities.
By uniting Kasm’s containerized desktop delivery with F5’s application delivery and security expertise, the partnership delivers an end-to-end, zero trust solution that operates seamlessly across hybrid and multicloud environments.
Key benefits of the joint solution
The joint solution from F5 and Kasm Technologies offers the following benefits:
- Zero trust security: F5 BIG-IP enforces zero trust network access (ZTNA) policies with advanced security features, including SSL offloading, WAF inspection, and identity-aware access controls. Each session is authenticated, authorized, and encrypted, ensuring that only verified users access Kasm Workspaces.
- Optimized performance & delivery: F5’s intelligent traffic steering and global load balancing ensure that users experience minimal latency and consistent performance, no matter their location. The platform accelerates content delivery and maintains availability during peak loads.
- Secure, simplified access: Through integration with identity providers via SAML, OAuth, and OpenID Connect, organizations can centralize authentication, implement role-based access controls, and streamline user logins—whether for containerized desktops or traditional workloads.
- Scalable architecture: Kasm’s container-native design allows for quick provisioning of desktops and apps, while F5 manages policy-based routing, distributed denial-of-service (DDoS) mitigation, and network segmentation. This setup is perfect for enterprises needing secure and fast scalability.
Technical integration in action
The solution is more than a high-level concept; it’s built for real-world deployments such as SSL offloading and load balancing, identity federation via SAML, and flexible workload support.
Using F5 BIG-IP Local Traffic Manager (LTM) and F5 BIG-IP Application Security Manager (ASM), organizations can deploy a secure, SSL-offloaded load balancer in front of Kasm Workspaces. This configuration includes WAF protection, health checks for Kasm backend nodes, and intelligent load distribution to ensure uptime and optimal performance.
With F5 BIG-IP Access Policy Manager (APM) acting as a SAML identity provider, organizations can integrate with Active Directory or other identity stores. Users can authenticate to Kasm Workspaces using their existing enterprise credentials, and administrators can centrally manage access policies—ensuring a streamlined and secure login experience.
Beyond browser-based Linux desktops, the joint architecture supports brokering RDP, VNC, and SSH sessions to non-containerized workloads, enabling a single access gateway for diverse environments.
Industry applications
The Kasm–F5 solution is especially suited for highly regulated industries where compliance, security, and performance are critical:
- Government – Secure remote access for distributed teams without exposing internal networks.
- Financial services – Protection of sensitive financial data with encrypted, authenticated sessions.
- Healthcare – Compliance with HIPAA and other regulations while enabling access to critical systems.
- Other regulated sectors – Any environment requiring rigorous access controls and system segmentation.
The bottom line
With Kasm Technologies and F5 working together, organizations get a future-proof, zero trust platform that not only meets today’s hybrid work needs but also prepares for tomorrow’s challenges. Whether you’re protecting sensitive government systems, enabling compliant healthcare access, or supporting high-performance trading environments, this partnership offers the scalability, security, and performance you require.
You can read more about the partnership and joint solution here. To learn more, contact Kasm Workspaces or F5.
About the Author

Related Blog Posts

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.
F5 Silverline Mitigates Record-Breaking DDoS Attacks
Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.
F5 Silverline: Our Data Centers are your Data Centers
Customers count on F5 Silverline Managed Security Services to secure their digital assets, and in order for us to deliver a highly dependable service at global scale we host our infrastructure in the most reliable and well-connected locations in the world. And when F5 needs reliable and well-connected locations, we turn to Equinix, a leading provider of digital infrastructure.
Volterra and the Power of the Distributed Cloud (Video)
How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.
Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.
The Internet of (Increasingly Scary) Things
There is a lot of FUD (Fear, Uncertainty, and Doubt) that gets attached to any emerging technology trend, particularly when it involves vast legions of consumers eager to participate. And while it’s easy enough to shrug off the paranoia that bots...
