A cloud-based managed service or express self-service that protects web applications and data, and enables compliance with 24x7 support.
When moving application workloads to the cloud, organizations like yours face challenges protecting enterprise data. Getting ahead of attacks while delivering consistent policies and compliance across environments can burden already taxed in-house security teams.
So, do you employ specialized IT security teams in-house—resulting in higher expenses and increased time to deploy policies—or offload web application firewall (WAF) policy management and compliance to a managed service or express self-service to drive efficiencies? Either way, those funds are better spent elsewhere.
Silverline Web Application Firewall is a cloud-based service built on BIG-IP Application Security Manager (ASM)—to help organizations protect web applications and data, and enable compliance with industry security standards, such as PCI DSS. Choose from two service options, provided via F5’s Silverline cloud-based application services platform:
Silverline Web Application Firewall >
Silverline Web Application Firewall delivers comprehensive layer 7 protection and compliance for enterprise data and web applications. You can deploy flexibly across all hybrid environments, gain access to the latest attack data and mitigations, and ensure consistent web application security and user experiences across traditional and cloud data centers.
Silverline Web Application Firewall is available in 1-year and 3-year subscriptions, based on the number of fully qualified domain names (FQDNs) protected and monthly bandwidth required.
We can help.
Call (866) 329-4253
or +1 (206) 272-7969
Learn more >
24 x 7 x 365
Silverline managed service removes upfront investments in IT costs, while giving you round-the-clock access to F5 experts who build, monitor, and fine-tune WAF policies.
Managed service offers comprehensive protection from advanced layer 7 attacks, OWASP Top Ten application security risks, and zero-day attacks—and enable compliance with key regulatory mandates. Express service enables effective attack protections, SSL offload, and app load balancing with maintained policy deployment.
Remove the complexity of WAF management, increase the speed to deploy new policies, and decrease operational expenses.
Access reports through the cloud-based customer portal and incorporate external intelligence for securing apps against identified threats. The customer portal provides immediate attack details and enhanced visibility into the mitigation techniques used to detect and prevent the application attack.
Receive managed service, including round-the-clock access to WAF experts who build, proactively monitor, and fine-tune WAF policies against known and emerging threats.
The security support we provide isn’t outsourced to a third-party. You’re talking to one of our own. We hire those hard-to-find, specialized security experts and they’re using F5 products combined with state-of-the-art security tools to ensure the best protection possible.
Watch the video
Find out how the expertise and services offered via the Security Operations Center can deflect the ever-growing number of security threats leveled at your business.
With a frequently updated list of threat sources and high-risk IP addresses, Silverline Threat Intelligence delivers context and analysis to identify and block malicious communications from multiple sources. This managed service is only available as an add-on to either Silverline DDoS Protection or the Silverline Web Application Firewall.
See more threat sources and read about how Silverline Threat Intelligence can help.
Blocks IP addresses hosting phishing sites and other fraudulent activity, such as click fraud or gaming fraud.
Detects and blocks IP addresses used in distributed denial-of-service (DDoS) attacks.
Denies botnet command and control channels, as well as infected zombie machines controlled by botmasters.
Mitigates IP addresses that provide proxy and anonymization services and The Onion Router (TOR) anonymizer addresses.
Provides reconnaissance that identifies probes, host scans, domain scans, and password brute force.