Head Solutions and Innovations at a tech services company with 11-50 employees
Real User
Jul 19, 2020
We primarily use the solution for DDoS protection. We use it as a multivector environment model. We are a system integrator so we have the opportunity to engage multiple customers. On the side of infrastructure protection, infrastructure monitoring, or infrastructure protection for application infrastructure protection, we use this. It's the very first point of call for attacks as it is at the edge of the system you have to protect. The F5 has what we call a Hybrid Defender, which is a DDoS platform. It operates at the edge of our network or traffic to prevent attacks based on signatures. It also works in a hybrid configuration with solutions and has a very good hybrid configuration with the cloud platform, which handles scrubbing. If there is a rudimentary attack it can intelligently signal the cloud and redirect traffic to the cloud where that attack can be fully mitigated before clean traffic is passed on to the user.
Distributed Denial-of-Service (DDoS) Protection solutions mitigate attacks designed to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of Internet traffic.DDoS Protection involves techniques and technologies that deploy proactive measures to safeguard networks against intentional attempts to make online services unavailable. A knowledgeable audience appreciates the importance of robust DDoS Protection as it ensures business continuity. This...
We primarily use the solution for DDoS protection. We use it as a multivector environment model. We are a system integrator so we have the opportunity to engage multiple customers. On the side of infrastructure protection, infrastructure monitoring, or infrastructure protection for application infrastructure protection, we use this. It's the very first point of call for attacks as it is at the edge of the system you have to protect. The F5 has what we call a Hybrid Defender, which is a DDoS platform. It operates at the edge of our network or traffic to prevent attacks based on signatures. It also works in a hybrid configuration with solutions and has a very good hybrid configuration with the cloud platform, which handles scrubbing. If there is a rudimentary attack it can intelligently signal the cloud and redirect traffic to the cloud where that attack can be fully mitigated before clean traffic is passed on to the user.