Head Solutions and Innovations at a tech services company with 11-50 employees
Real User
2020-07-19T08:15:51Z
Jul 19, 2020
We primarily use the solution for DDoS protection. We use it as a multivector environment model. We are a system integrator so we have the opportunity to engage multiple customers. On the side of infrastructure protection, infrastructure monitoring, or infrastructure protection for application infrastructure protection, we use this. It's the very first point of call for attacks as it is at the edge of the system you have to protect. The F5 has what we call a Hybrid Defender, which is a DDoS platform. It operates at the edge of our network or traffic to prevent attacks based on signatures. It also works in a hybrid configuration with solutions and has a very good hybrid configuration with the cloud platform, which handles scrubbing. If there is a rudimentary attack it can intelligently signal the cloud and redirect traffic to the cloud where that attack can be fully mitigated before clean traffic is passed on to the user.
Distributed Denial-of-Service Protection solutions defend against massive disruptions by mitigating unwanted traffic, ensuring business continuity. They shield organizations from service outages and downtime that could affect performance and customer satisfaction.Understanding and managing Distributed Denial-of-Service attacks requires sophisticated technology capable of identifying and blocking malicious traffic patterns. These protections enable businesses to maintain access to online...
We primarily use the solution for DDoS protection. We use it as a multivector environment model. We are a system integrator so we have the opportunity to engage multiple customers. On the side of infrastructure protection, infrastructure monitoring, or infrastructure protection for application infrastructure protection, we use this. It's the very first point of call for attacks as it is at the edge of the system you have to protect. The F5 has what we call a Hybrid Defender, which is a DDoS platform. It operates at the edge of our network or traffic to prevent attacks based on signatures. It also works in a hybrid configuration with solutions and has a very good hybrid configuration with the cloud platform, which handles scrubbing. If there is a rudimentary attack it can intelligently signal the cloud and redirect traffic to the cloud where that attack can be fully mitigated before clean traffic is passed on to the user.