Advertisment

F5 Networks ensures data security to the cloud

author-image
CIOL Bureau
Updated On
New Update

NEW DELHI, INDIA: F5 Networks has announced enhanced BIG-IP solution capabilities delivering new security services for applications deployed in the cloud.

Advertisment

Application security provided by F5 Solutions, including BIG-IP Local Traffic Manager, BIG-IP Edge Gateway, and BIG-IP Application Security Manager, ensure that enterprise applications and data are safe even when deployed in the cloud. The new BIG-IP Version 10.2 software enhances F5’s security offerings, enabling customers to lower infrastructure costs, optimize application access, and secure applications in the enterprise and the cloud.

With BIG-IP solutions, customers can assign policy-based access permissions based on user, location, device, and other variables. This enables organizations to extend context-aware access to corporate materials while keeping their most valuable assets secure whether the data stored is in the data center, internal cloud, or external cloud.

“Deploying applications in the cloud can create significant security headaches for IT if the right supporting pieces aren’t in place,” said Mark Vondemkamp, director–Product Management for Security, F5.

“Administrations need an integrated approach to application security–no matter where the applications are deployed–to maintain access control standards when applications are deployed in a cloud scenario. BIG-IP solutions address organizations needs by combining simplified application access and ICSA-certified security solutions in a unified, flexible solution architecture.” he said.

The BIG-IP v10.2 release introduces new security functionality throughout the BIG-IP product family. By unifying application delivery, security, optimization, and access control on a single platform, security capabilities can be extended across data center environments and in the cloud. F5 security solutions provide comprehensive application security, including packet filtering, port lock down, attack protection, network isolation, protocol validation, dynamic rate limiting, SSL termination, access policy management, and much more.

tech-news