View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
October 6, 2015

FireEye teams up with F5 Networks on enterprise security

Companies will combine application delivery technologies with threat management for applications and data centres.

By CBR Staff Writer

Cyber security provider FireEye has entered into a partnership with F5 Networks to offer integrated security solution to address the advanced security issues faced by enterprises.

F5 Networks specialises in Application Delivery Networking (ADN) technology that enhances the delivery of network-based applications and the security, performance, availability of servers, data storage devices, and other network resources.

The partnership will be beneficial to customers as they will get comprehensive security solutions that integrate advanced threat protection from FireEye Network Security and application delivery infrastructure from F5.

The partnership will boost network traffic security that enters and exits the corporate network.

Users will also benefit from a comprehensive security solution that blends application delivery infrastructure with advanced content security which includes network segmentation and policy management, protocol conformance, DDoS mitigation, SSL inspection, threat intelligence, forensics, and analytics.

Customers will be able to scale and protect their network against advanced threats even in the most demanding application environments by using the health monitoring and load-balancing capabilities of the BIG-IP platform.

The BIG-IP platform offers the application intelligence that network managers need to ensure applications are fast, secure, and available.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

Users will also be able to make use of integrated security architecture that drives advanced content security by enabling improved visibility into the growing stream of encrypted traffic.

It will also provide faster and better insights into malicious activities and breaches across the enterprise.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.