{"id":20739,"date":"2017-01-25T10:15:02","date_gmt":"2017-01-25T17:15:02","guid":{"rendered":"https://www.webroot.com/blog/?p=20739"},"modified":"2018-01-30T10:16:33","modified_gmt":"2018-01-30T17:16:33","slug":"f5-changing-application-security-game","status":"publish","type":"post","link":"https://www.webroot.com/blog/2017\/01\/25\/f5-changing-application-security-game\/","title":{"rendered":"How F5 is Changing the Application Security Game"},"content":{"rendered":"<p>To address the need for application security in the digital transformation era, F5 is releasing a new host of products and services.<\/p>\n<p>\u201cThe digital transformation has really changed security as a whole,\u201d says Preston Hogue, Director of Security Marketing and Competitive Intelligence. What he means is that everything\u2014EVERYTHING\u2014is moving to the cloud. Think about the companies from years ago, such as Blockbuster, versus their modern counterparts, like Netflix or Hulu. Think about the fact that most of <a href=\"https:\/\/www.firstdata.com\/en_us\/all-features\/millennials.html\">today\u2019s twenty-somethings<\/a> have never set foot in a physical bank branch, but use online banking daily. Now think about the fact that every service I\u2019ve mentioned so far has an application, which is the primary method of interaction for users.<\/p>\n<blockquote><p>The application is the new perimeter and identity is the key to that perimeter. Over 70% of all data breaches occur by accessing applications. At F5, we are focused on securing our customers\u2019 applications; both by securing access to the apps, and by securing the apps themselves where they reside.<\/p><\/blockquote>\n<p>We spoke with Preston about the newest security products F5 is\u00a0launching, and how they\u2019re using Webroot BrightCloud\u00ae IP Reputation intelligence to help power their solutions.<\/p>\n<hr \/>\n<h6><strong>Webroot: Tell us a little bit about the security launch. What should we expect to see?<\/strong><\/h6>\n<p><strong>Preston Hogue:<\/strong><em> First, we are launching a family of dedicated security products called Herculon. The first two components of the Herculon product family are the Herculon SSL Orchestrator and the Herculon DDoS Hybrid Defender. These products are dedicated to solving the challenges of SSL\/TLS encrypted traffic and ensuring application availability.<\/em><\/p>\n<p><em>Second, we\u2019re announcing a new service called Silverline WAF Express, which will give customers easy, self-service access to our cutting-edge web application firewall. We\u2019ve been deploying web application firewalls on premises for some time and also offer a fully managed service. Since some customers don\u2019t have the time or resources to install and maintain the software, or maintain the racks and stack and everything within their environment, we\u2019re giving them a simpler self-service experience.<\/em><\/p>\n<p><em>Our focus on securing applications means our overall threat research is geared toward application threat intelligence\u2014really trying to get to the root cause of the 70+% of data breaches I mentioned previously\u2014so we\u2019re also announcing increased investment in our F5 Labs threat intelligence team.<\/em><\/p>\n<p><em>Last but not least, we\u2019re also announcing that the services of our security incident response team (SIRT), a dedicated team of highly trained individuals within the support organization, are now available to all F5 customers around the world. This team will be the highest level of escalation for security and service response.<\/em><\/p>\n<h6><strong>Since threat intelligence is such a huge component of your offerings, what should your target customers consider when choosing threat intelligence sources for themselves?<\/strong><\/h6>\n<p><em>There are a lot of companies that offer threat intelligence, but it\u2019s challenging because they all claim a kind of broad, generic expertise. We advise that customers look for specificity; for targeted, actionable information that pertains to what they\u2019re trying to do. Looking at a company like Webroot, you\u2019ve taken on very specific aspects of threat intelligence and you\u2019ve been able to master those particular areas\u2014like the Webroot IP reputation intelligence that we integrate. <\/em><\/p>\n<p><em>We see a lot of organizations trying to take on too much. That\u2019s why we\u2019re very definitive about the scope of what we\u2019re trying to accomplish, and why we focus on leveraging our application security expertise around threats and ensuring we can provide very specific, clear, actionable threat intelligence with F5 Labs.<\/em><\/p>\n<h6><strong>What do you hope your customers will gain by implementing your solutions with Webroot BrightCloud IP Reputation intelligence?<\/strong><\/h6>\n<p><em>We know we have the expertise when it comes to understanding the overall threat to an application. We partner with companies like Webroot for insight into a particular aspect of threats; in Webroot\u2019s case, it\u2019s insight into IP addresses and additional threat information around user agents and anonymous proxies. We\u2019re very specific in our threat intelligence, and we know we\u2019re not always able to show the entire picture on our own. So we are able to fill in other areas of the overall threat landscape through our partnerships to ensure that we can give our customers the full picture they need.<\/em><\/p>\n<h6><strong>How do you see the F5 security launch changing the security industry?<\/strong><\/h6>\n<p><em>F5 has been in application security for over 20 years. From what we\u2019ve seen, digital transformation is changing security as a whole. It has driven applications out of the data center and into the cloud. That means there are 3.2 billion users on the internet, who all potentially have access to these applications, which makes them a big target for breaches. Because of our expertise within the field, F5 is in the perfect position to provide visibility into this threat landscape, and also the control our customers need to achieve a secure application experience.<\/em><\/p>\n<hr \/>\n<p>In his closing comments, Hogue had the following to say, \u201cTo secure access to applications and to secure the apps where they reside, you need a complete picture of the threats that target apps. You need a team like F5, with an ecosystem of intelligence partners like Webroot to provide that picture. And that\u2019s how, ultimately, we can help our customers solve today\u2019s security challenges and keep users safe.\u201d<\/p>\n<p><strong>Learn more about <a href=\"https:\/\/www.webroot.com\/us\/en\/business\/threat-intelligence#tab1-bcti\">Webroot BrightCloud IP Reputation intelligence<\/a>.\u00a0<\/strong><strong>Or, for more information about F5\u2019s security launch, read the <a href=\"https:\/\/f5.com\/about-us\/news\/press-releases\/f5-delivers-application-security-for-the-digital-economy\">press release<\/a>.<\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To address the need for application security in the digital transformation era, F5 is releasing a new host of products and services. \u201cThe digital transformation has really changed security as a whole,\u201d says Preston Hogue, Director of Security Marketing and Competitive Intelligence. What he means is that everything\u2014EVERYTHING\u2014is moving to the cloud. Think about the [&hellip;]<\/p>\n","protected":false},"author":71,"featured_media":20775,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4209,20535,20533,20529,4951,20543,20547,3817,20537,20525,20539,3479,20541,20545,3569,3789,3525,20531,20527,20523],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/20739"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=20739"}],"version-history":[{"count":42,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/20739\/revisions"}],"predecessor-version":[{"id":20821,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/20739\/revisions\/20821"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/20775"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=20739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=20739"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=20739"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=20739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}