F5 improves security of apps and APIs

F5 improves security of apps and APIs

Share post

F5 improves the security of apps and APIs for modern digital offerings. The new SaaS products ensure the security of applications: Device ID and Shape Recognize use unique data and analysis functions that eliminate login problems and at the same time protect against fraud.

The new offers also strengthen the technological leadership position of F5. The company combines multi-cloud security and deployment for applications with protection technologies against bots and fraud. This protects companies and people from current threats.

APIs are always a target for hackers

"APIs play an essential role in the reach of digital offerings for companies in every industry - but also in the attack surface for hackers," says Haiyan Song, EVP of Security at F5. “We believe that the new cybersecurity epicenter is in applications and APIs. Accordingly, the greatest challenge for security experts is to protect the constantly growing number of digital offerings. Security must be native to applications and APIs, applied continuously and in real time, and supported by data and AI. "

Strategic fraud prevention and high application security

F2021 Labs will publish the 5 Application Protection Report shortly, which traces more than two thirds of API security incidents back to incomplete authentication and authorization at API endpoints. The new solutions from F5 protect against this. They are based on the acquisition of Shape Security, which was completed in January 2020.

Device ID identifies devices with high precision and in real time. It enables companies to better understand the devices that interact with websites and mobile apps. The solution uses advanced signal acquisition and proven machine learning algorithms to assign a unique ID to each device. This is based on the browser, operating system, hardware and network attributes. If devices access the website or app more frequently, the usage behavior can be analyzed in order to achieve a smooth experience for known, legitimate users by reducing protective measures. They then do not have to prove the legitimacy of the device every time and can use the digital offer more quickly. The solution is now available to all F5 customers free of charge.

User recognition prevents excessive logins

Shape Recognize leverages Shape's extensive telemetry and Device ID capabilities with insights into login history, environment, and health across the network. This improves the customer experience and eliminates authentication problems. The solution recognizes legitimate users and protects known customers from excessive logins and re-authentication. Recognize achieves this through the precise identification of returning customers and other legitimate users in real time with the help of in-depth analyzes, behavior and context recognition as well as the large reach of the Shape network. In this way, web-based and mobile applications can reduce or avoid the login effort. This leads to higher sales and significantly improved customer comfort.

Machine learning to detect fraud in real time

Both solutions complement the Shape AI Fraud Engine (SAFE), which was released in October 2020. It uses a closed-loop machine learning approach to detect and prevent fraud in real time. SAFE identifies and stops account takeovers, malicious account openings, the exploitation of stolen accounts and other fraudulent activities. Based on Shape's AI engine and knowledge gained from evaluating more than a billion transactions per day, SAFE searches for and eliminates attempted fraud at all points in the user journey. This includes signing up, creating an account, and other activities that serve as potential targets. As a fully managed service, SAFE also reduces the workload of security teams and mitigates threats that would require costly investigations and remedial action.

AI analysis platform in the area of ​​application security

"With the takeover of Shape Security, we have expanded our SaaS offering in the area of ​​application security and gained a powerful AI analysis platform," says Chris Dercks, Regional Vice President DACH at F5. “The new solutions are easy to implement and use Shape's core technologies and extensive experience in protecting the world's leading institutions. In addition, they reflect our comprehensive security strategy for applications, which is also supported by the acquisitions of NGINX and, most recently, Volterra. "

More at F5.com

 


Via F5 Networks

F5 (NASDAQ: FFIV) gives the world's largest companies, service providers, government agencies and consumer brands the freedom to deliver any app securely, anywhere, with confidence. F5 offers cloud and security solutions that enable companies to use the infrastructure they choose without compromising speed and control. Please visit f5.com for more information. You can also visit us on LinkedIn and Facebook for more information about F5, its partners and technologies.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more