View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
February 26, 2014

The new solutions that could bolster your web and fraud protection

New offerings aim to empower enterprises to provide broad-based protection for networks, employees, and customers.

By Duncan Macrae

F5 Networks has released two new solutions, the F5 Secure Web Gateway Services and F5 Web Fraud Protection reference architecture.

The former is said to enable enterprises to defend against potential malware threats encountered by employees who regularly access web pages and use web-based applications, Software as a Service (SaaS) applications, and social media sites.
With this solution, enterprises can consolidate their security infrastructures and better enforce policy and regulatory requirements, according to F5 Networks.

The company’s Web Fraud Protection reference architecture aims to help enterprises protect their users and customers from web-based and mobile threats, regardless of the type of device or browser they use or the location from which they access the Internet and web-based applications. Together, it is hoped that these solutions will help enterprises protect against advanced persistent web threats, ensure policy compliance, and improve employee productivity.

These latest security-focused offerings add to F5’s growing repertoire of Software Defined Application Services (SDAS), designed to help customers deploy applications safely and reliably in any IT environment. In November 2013, as part of its F5 Synthesis vision, F5 announced the DDoS Protection reference architecture to help enterprises ensure network and application availability, and the Cloud Federation reference architecture to enable enterprises to safely use SaaS applications.

Mark Vondemkamp, VP of Security Product Management and Marketing at F5, said: "F5 is helping enterprises tackle a broad spectrum of security challenges head on by continuing to expand our security offerings.

"Our focus remains on safely connecting users, whatever type of device they’re using, with applications, wherever they may reside – and giving enterprises complete control over the policies that govern those connections. Whether you’re talking about inbound or outbound protection, we believe it should all be part of one comprehensive application security strategy."
 

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU