Security News > 2020 > February > F5 delivers multi-cloud security solutions for apps, services
As a leader in WAF and API security technology, F5 delivers application security with consistent policies and controls across hybrid- and multi-cloud environments.
"Our security strategy is rooted in what customers are trying to accomplish-optimum app performance with maximized uptime, lower overall costs, and reduced losses due to fraud or abuse," said John Morgan, VP and GM of Security at F5. "Security remains a key area where we see conflict between increasing business velocity and implementing adequate protections. F5's application security solutions free developers to focus on the application business logic and customer experience while also providing world-class threat protection with policy and control consistency across on-prem and cloud environments."
F5's application security portfolio spans four solution areas that correlate directly to the areas organizations must protect to deliver applications and services: Application Layer Security; Trusted Application Access; Application Infrastructure Security; and Intelligent Threat Services.
Application layer security comprises security at or near the application, typically referring to layers 4 through 7 of the OSI model.
F5 solutions guard against application threats, such as application layer denial of service, malicious scripting, and injection attacks.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/uOQpGflbfdo/
Related news
- Strategies for CISOs navigating hybrid and multi-cloud security (source)
- Cloud Security Policy (source)
- Whitepaper: Reach higher in your career with cloud security (source)
- Transforming cloud security with real-time visibility (source)
- Multi-cloud Strategies Making DDI and DNS Cumbersome to Manage (source)
- Top 5 Cloud Security Automations for SecOps Teams (source)
- Microsoft lost some customers’ cloud security logs (source)
- How AI Is Changing the Cloud Security and Risk Equation (source)
- 5 Steps to Boost Detection and Response in a Multi-Layered Cloud (source)
- Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers (source)