New SaaS-based security solution

New SaaS-based security solution

Share post

The F5 Distributed Cloud App Infrastructure Protection (AIP) solution extends application observability and protection to cloud-native infrastructures. Built on the technology acquired with Threat Stack, AIP complements the F5 Distributed Cloud Services portfolio of cloud-native, SaaS-based services for application security and delivery.

Companies of all sizes and industries are currently looking to simplify, secure and modernize application-based digital experiences. But many face the challenge of managing distributed and hybrid application infrastructures with workloads spread across on-premises, public cloud, and edge locations. This leads to enormous complexity and increases the attack surface. To date, customers have had to use inconsistent security measures - and lack the necessary transparency, especially for cloud-native implementations.

Intrusion detection for cloud-native workloads

Attacks that exploit Log4j and Spring4Shell, for example, can bypass signature-based detection mechanisms and specifically attack vulnerabilities and misconfigurations in the application infrastructure. Distributed cloud AIP provides deep telemetry collection and highly efficient intrusion detection for cloud-native workloads. Combined with F5 Distributed Cloud WAAP's inline application and API security, this enables a defense-in-depth approach. This protects against threats that extend across applications, APIs and the associated cloud-native infrastructures.

Against vulnerabilities and misconfigurations

A large majority of companies today deploy microservices-based applications on cloud-native infrastructures and connect them via APIs. This approach to application development can significantly increase the pace of innovation while lowering the total cost of ownership. However, vulnerabilities and misconfigurations at the infrastructure layer make these applications vulnerable to internal and external attacks. Cyber ​​criminals use vulnerabilities in cloud services or stolen keys to gain access to cloud-native resources. There they can then often move freely in the infrastructure, inject malware, run cryptominers or access sensitive data.

F5 Distributed Cloud App Infrastructure Protection

  • A combination of rules and machine learning for real-time threat detection across the infrastructure stack. This also includes APIs from cloud providers, virtual machine instances, containers and Kubernetes. With behavior-based detection, AIP can identify insider threats, external threats, and risk of data loss for modern applications.
  • Detection and reporting of anomalous behavior affecting workloads. This notifies operations teams of potentially malicious activity that may require action to block or remediate.
  • Augment existing signature and behavior-based threat detection capabilities with actionable insights from advanced telemetry and post-attack activity detection at the application and cloud infrastructure layers.
  • F5 Distributed Cloud AIP Managed Security Services. The "always-on" Security Operations Center team detects, prioritizes and investigates threats and makes recommendations for remediation.
  • F5 Distributed Cloud AIP Insights. The service offers customized platform analysis and ongoing coaching from F5's cloud security experts. They also support customers in building a stronger cloud SecOps strategy.
More at F5.com

 


Via F5 Networks

F5 (NASDAQ: FFIV) gives the world's largest companies, service providers, government agencies and consumer brands the freedom to deliver any app securely, anywhere, with confidence. F5 offers cloud and security solutions that enable companies to use the infrastructure they choose without compromising speed and control. Please visit f5.com for more information. You can also visit us on LinkedIn and Facebook for more information about F5, its partners and technologies.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more