The new solutions that could bolster your web and fraud protection


by Duncan MacRae| 26 February 2014

New offerings aim to empower enterprises to provide broad-based protection for networks, employees, and customers.

F5 Networks has released two new solutions, the F5 Secure Web Gateway Services and F5 Web Fraud Protection reference architecture.

The former is said to enable enterprises to defend against potential malware threats encountered by employees who regularly access web pages and use web-based applications, Software as a Service (SaaS) applications, and social media sites.
With this solution, enterprises can consolidate their security infrastructures and better enforce policy and regulatory requirements, according to F5 Networks.

The company's Web Fraud Protection reference architecture aims to help enterprises protect their users and customers from web-based and mobile threats, regardless of the type of device or browser they use or the location from which they access the Internet and web-based applications. Together, it is hoped that these solutions will help enterprises protect against advanced persistent web threats, ensure policy compliance, and improve employee productivity.

These latest security-focused offerings add to F5's growing repertoire of Software Defined Application Services (SDAS), designed to help customers deploy applications safely and reliably in any IT environment. In November 2013, as part of its F5 Synthesis vision, F5 announced the DDoS Protection reference architecture to help enterprises ensure network and application availability, and the Cloud Federation reference architecture to enable enterprises to safely use SaaS applications.

Mark Vondemkamp, VP of Security Product Management and Marketing at F5, said: "F5 is helping enterprises tackle a broad spectrum of security challenges head on by continuing to expand our security offerings.

"Our focus remains on safely connecting users, whatever type of device they're using, with applications, wherever they may reside - and giving enterprises complete control over the policies that govern those connections. Whether you're talking about inbound or outbound protection, we believe it should all be part of one comprehensive application security strategy."

Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

729 people like this.
1722 people follow this.

Security Intelligence

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.