Head Solutions and Innovations at a tech services company with 11-50 employees
Real User
2020-07-19T08:15:51Z
Jul 19, 2020
We primarily use the solution for DDoS protection. We use it as a multivector environment model. We are a system integrator so we have the opportunity to engage multiple customers. On the side of infrastructure protection, infrastructure monitoring, or infrastructure protection for application infrastructure protection, we use this. It's the very first point of call for attacks as it is at the edge of the system you have to protect. The F5 has what we call a Hybrid Defender, which is a DDoS platform. It operates at the edge of our network or traffic to prevent attacks based on signatures. It also works in a hybrid configuration with solutions and has a very good hybrid configuration with the cloud platform, which handles scrubbing. If there is a rudimentary attack it can intelligently signal the cloud and redirect traffic to the cloud where that attack can be fully mitigated before clean traffic is passed on to the user.
Distributed Denial-of-Service Protection safeguards online services by mitigating attacks that overwhelm resources, ensuring service continuity and security for businesses.Distributed Denial-of-Service Protection involves a series of measures designed to defend against large-scale network attacks. These solutions filter malicious traffic without affecting user experience. Advanced detection and real-time monitoring are critical for timely responses. With comprehensive attack analytics,...
We primarily use the solution for DDoS protection. We use it as a multivector environment model. We are a system integrator so we have the opportunity to engage multiple customers. On the side of infrastructure protection, infrastructure monitoring, or infrastructure protection for application infrastructure protection, we use this. It's the very first point of call for attacks as it is at the edge of the system you have to protect. The F5 has what we call a Hybrid Defender, which is a DDoS platform. It operates at the edge of our network or traffic to prevent attacks based on signatures. It also works in a hybrid configuration with solutions and has a very good hybrid configuration with the cloud platform, which handles scrubbing. If there is a rudimentary attack it can intelligently signal the cloud and redirect traffic to the cloud where that attack can be fully mitigated before clean traffic is passed on to the user.