Modern attacks on organizations may generally be organized by type, into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack.
Taken together, the F5 BIG-IP portfolio of products provide effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools including:
- Volumetric attacks
- Network and protocol based anomalies
- Application layer visibility and security
- Demonstrations on SSL visibility and application layer security
- Malware / Fraud / Advanced Phishing Detection
- Best practices for version upgrades
This is grass-roots experience for network and security engineers, application owners, and management, where you have the opportunity to receive advice and connect with your peers.
Regards,
Deric Brown
F5 Government Team at
Carahsoft Technology Corp.
(703) 230-7564 (Direct)
(877) 95-F5GOV (Team)