{"id":1609,"date":"2013-01-31T00:00:00","date_gmt":"2013-01-31T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/01\/31\/f5-networks-introduces-application-delivery-firewall\/"},"modified":"2021-12-30T11:39:41","modified_gmt":"2021-12-30T11:39:41","slug":"f5-networks-introduces-application-delivery-firewall","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/01\/31\/f5-networks-introduces-application-delivery-firewall\/","title":{"rendered":"F5 Networks introduces application delivery firewall"},"content":{"rendered":"<p>When deployed with F5\u2019s new VIPRION 4800 hardware, the F5 application delivery firewall solution provides performance levels well beyond what other vendors can offer. By consolidating the network and security functions of several BIG-IP modules into an integrated solution, F5 helps organizations reduce management complexity and overhead, while maintaining superior performance and scalability.  At the core of F5\u2019s application delivery firewall solution, the BIG-IP Advanced Firewall Manager product is an innovative network firewall built on full-proxy architecture to provide outstanding security. &#8230;  This application-centric security model leverages F5\u2019s industry-leading application delivery capabilities and intelligence to enhance customers\u2019 overall security posture, while alleviating the complexity associated with mapping application infrastructure to static constructs such as traditional firewall zones.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With support for SAML 2.0, F5 now offers improved single sign-on (SSO) capabilities for web-based, VDI, and client\/server applications\u2014whether hosted in corporate data centers or the cloud.   In addition, BIG-IP APM offers identity federation across multiple product instances within an organization, reducing the number of passwords needed by users to access corporate applications. <\/p>\n<p>BIG-IP ASM now features support for applications written with the Google Web Toolkit, meaning security teams can enforce application security policies that use this widely adopted framework.   Additionally, BIG-IP ASM can better detect and mitigate clickjacking, a growing web threat that attackers use to trick others into revealing personal information.<\/p>\n<p>Link: http:\/\/www.net-security.org\/secworld.php?id=14332<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1609","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1609"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1609\/revisions"}],"predecessor-version":[{"id":4096,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1609\/revisions\/4096"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}