F5 Distributed Cloud Services now enables customers to protect both applications and the infrastructure where they run
SEATTLE – F5 (NASDAQ: FFIV) today announced the launch of F5 Distributed Cloud App Infrastructure Protection (AIP), a cloud workload protection solution that expands application observability and protection to cloud-native infrastructures. Powered by technology acquired with Threat Stack, AIP is the newest addition to the F5 Distributed Cloud Services portfolio of cloud-native SaaS-based application security and delivery services.
Organizations of all sizes across industries are in the midst of efforts aimed at simplifying, securing, and innovating application-driven digital experiences. However, many face the challenge of managing distributed and hybrid application infrastructures composed of workloads across on-premises, public cloud, and edge locations. This creates tremendous complexity and increases the security threat surface, and as a result customers are forced to deploy inconsistent security controls and lack necessary visibility, particularly for cloud-native deployments.
Attacks such as those exploiting Log4j and Spring4Shell can evade signature-based detection defense mechanisms and target vulnerabilities and misconfigurations within application infrastructure. Distributed Cloud AIP brings deep telemetry collection and high-efficacy intrusion detection for cloud-native workloads and—when combined with the in-line application and API security from F5 Distributed Cloud WAAP—delivers a defense-in-depth approach to security threats that span across applications, APIs, and the cloud-native infrastructures where they run.
“Organizations are managing a dauntingly complex mix of hybrid and multi-cloud application architectures that can slow the pace of digital innovation and create subsequent security risks,” said Kara Sprague, Executive Vice President and Chief Product Officer, F5. “The addition of AIP fills a critical need for customers as they look for ways to extend robust security controls to multiple cloud infrastructures where they run their modern applications.”
A large majority of organizations are now deploying microservices-based applications on cloud-native infrastructure and connecting them through APIs. This approach to application development can radically increase the pace of innovation while lowering total cost of ownership. However, vulnerabilities and misconfigurations at the infrastructure level leave these applications open to attack from both internal and external bad actors. These intruders leverage vulnerabilities in cloud services or stolen keys to get access to cloud-native resources, where they can move freely throughout the infrastructure, inject malware, run cryptominers, or access sensitive data.
F5 Distributed Cloud App Infrastructure Protection addresses these challenges through:
More information can be found on the product page of f5.com.
F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats. For more information, go to f5.com. (NASDAQ: FFIV)
You can also follow @F5 on Twitter or visit us on LinkedIn and Facebook for more information about F5, its partners, and technologies. F5 is a trademark, service mark, or tradename of F5, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.
# # #
This press release may contain forward looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC.