F5 Introduces SSL Orchestrator and Access Manager
July 26, 2018

F5 Networks introduced new offerings that provide advanced access controls and dedicated SSL visibility with orchestration capabilities to help thwart today’s most sophisticated cyber attacks.

“Applications are everywhere, and increasingly interrelated, with many added capabilities inadvertently yielding new opportunities for attack,” said Ram Krishnan, SVP and GM, Security at F5. “Our value proposition is simple: we give you the ability to deploy standalone or integrated security for all types of applications, environments, and use cases. Customers enjoy the versatility of world-class products, cloud-based solutions, support services, and F5’s broad security capabilities that can protect applications better than anyone else in the industry.”

While most traffic and data handled by applications is now encrypted, many security stack service offerings (e.g., firewalls and IPS) are unable to efficiently process SSL encrypted traffic at the scale and speed businesses demand. Beyond mere SSL awareness and offload, F5 SSL Orchestrator provides policy-based orchestration capabilities across the full security service chain for any network topology, device, or application.

Orchestration on this level groups devices into services to intelligently decrypt and steer traffic, allowing for independent monitoring, load balancing, and scaling to adapt to changing network conditions and increasing traffic demands. This marks a vast improvement over the industry’s legacy security model, where piecemeal inspection devices perform decryption independently, frequently leaving gaps for attackers.

As a dedicated security appliance delivering insight to mitigate threats traversing the network, SSL Orchestrator provides:

- Operational Efficiency – Dynamic service chaining and policy-based traffic steering help organizations intelligently manage encrypted traffic flows across the entire app security infrastructure.

- Full Visibility – High-performance decryption and encryption of inbound and outbound SSL/TLS traffic enable quicker threat detection and attack remediation.

- Improved Risk Management – SSL orchestration lets organizations maximize their investments around malware, DLP, ransomware, and firewall protections, safeguarding user privacy through hardened security with robust cipher management.

F5 Access Manager protects sensitive data with a Zero Trust model while providing access for authorized users, devices, and APIs, guarding against pervasive threats such as man-in-the-middle attacks. Product features enable organizations to think outside of traditional security boundaries, empowering them to unlock additional business models and operational efficiencies without compromising protections around apps, users, and data.

As a secure, flexible, high-performance proxy solution delivering unified global access management, F5 Access Manager provides:

- Streamlined Access Controls – Context-sensitive policies with guided configuration deliver trusted access to users, devices, and APIs for increased business efficiency, while real-time web form encryption safeguards user credentials and prevents fraud.

- Accelerated Business Innovation – As IT transforms to support continuous deployment methodologies, Access Manager provides a centralized solution for access control, including API authorization. This means DevOps teams can hand off apps to NetOps personnel more quickly, and NetOps can better deliver a consistent user experience without sacrificing manageability.

- Scalability into the Cloud – While SaaS and cloud applications provide numerous advantages, many organizations are choosing not to move all apps off-premises. With advanced F5 virtual edition support and high-capacity licensing, Access Manager provides the scale necessary to bridge on-prem app functionality to the cloud, effectively integrating with IDaaS solutions and capabilities to support evolving heterogenous environments.

F5’s SSL Orchestrator and Access Manager products will be generally available in the fourth quarter of calendar year 2018.

The Latest

August 16, 2018

There once was a time in software development where developers could design, build and then think about their software's security. However in today's highly connected, API-driven application environment, this approach is simply too risky as it exposes the software to vulnerabilities ...

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

August 02, 2018

Results from new Forrester Consulting research reveal the 20 most important Agile and DevOps quality metrics that separate DevOps/Agile experts from their less advanced peers ...

July 31, 2018

Even organizations that understand the importance of cybersecurity in theory often stumble when it comes to marrying security initiatives with their development and operations processes. Most businesses agree that everyone should be responsible for security, but this principle is not being upheld on a day-to-day basis in many organizations. That’s bad news for everyone. Here are some best practices for implementing SecOps ...

July 30, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps is a methodology that seeks to address this by operationalizing and hardening security throughout the software lifecycle ...

July 26, 2018

Organizations are shifting away from traditional, monolithic architectures, with three-quarters of survey respondents delivering at least some of their applications and more than one-third delivering most of their applications as microservices, according to the State of DevOps Observability Report from Scalyr ...

Share this