The F5 Distributed Cloud App Infrastructure Protection (AIP) solution extends application observability and protection to cloud-native infrastructures. Built on the technology acquired with Threat Stack, AIP complements the F5 Distributed Cloud Services portfolio of cloud-native, SaaS-based services for application security and delivery.
Companies of all sizes and industries are currently looking to simplify, secure and modernize application-based digital experiences. But many face the challenge of managing distributed and hybrid application infrastructures with workloads spread across on-premises, public cloud, and edge locations. This leads to enormous complexity and increases the attack surface. To date, customers have had to use inconsistent security measures - and lack the necessary transparency, especially for cloud-native implementations.
Intrusion detection for cloud-native workloads
Attacks that exploit Log4j and Spring4Shell, for example, can bypass signature-based detection mechanisms and specifically attack vulnerabilities and misconfigurations in the application infrastructure. Distributed cloud AIP provides deep telemetry collection and highly efficient intrusion detection for cloud-native workloads. Combined with F5 Distributed Cloud WAAP's inline application and API security, this enables a defense-in-depth approach. This protects against threats that extend across applications, APIs and the associated cloud-native infrastructures.
Against vulnerabilities and misconfigurations
A large majority of companies today deploy microservices-based applications on cloud-native infrastructures and connect them via APIs. This approach to application development can significantly increase the pace of innovation while lowering the total cost of ownership. However, vulnerabilities and misconfigurations at the infrastructure layer make these applications vulnerable to internal and external attacks. Cyber criminals use vulnerabilities in cloud services or stolen keys to gain access to cloud-native resources. There they can then often move freely in the infrastructure, inject malware, run cryptominers or access sensitive data.
F5 Distributed Cloud App Infrastructure Protection
- A combination of rules and machine learning for real-time threat detection across the infrastructure stack. This also includes APIs from cloud providers, virtual machine instances, containers and Kubernetes. With behavior-based detection, AIP can identify insider threats, external threats, and risk of data loss for modern applications.
- Detection and reporting of anomalous behavior affecting workloads. This notifies operations teams of potentially malicious activity that may require action to block or remediate.
- Augment existing signature and behavior-based threat detection capabilities with actionable insights from advanced telemetry and post-attack activity detection at the application and cloud infrastructure layers.
- F5 Distributed Cloud AIP Managed Security Services. The "always-on" Security Operations Center team detects, prioritizes and investigates threats and makes recommendations for remediation.
- F5 Distributed Cloud AIP Insights. The service offers customized platform analysis and ongoing coaching from F5's cloud security experts. They also support customers in building a stronger cloud SecOps strategy.
Via F5 Networks F5 (NASDAQ: FFIV) gives the world's largest companies, service providers, government agencies and consumer brands the freedom to deliver any app securely, anywhere, with confidence. F5 offers cloud and security solutions that enable companies to use the infrastructure they choose without compromising speed and control. Please visit f5.com for more information. You can also visit us on LinkedIn and Facebook for more information about F5, its partners and technologies.