F5 has expanded the scope of its cloud security platform to include the infrastructure on which applications are deployed, using technology from its acquisition of ThreatStack in late 2021.
Chris Ford, regional vice president of F5, said F5 Distributed Cloud App Infrastructure Protection (AIP) expands the range of capabilities the company currently offers through its software-as-a-service platform. F5 Distributed Cloud AIP is a platform that already protects both web applications and application programming interfaces (APIs) by combining telemetry data collection with intrusion detection capabilities that use rules and machine learning algorithms in real time. Expand the range of
As such, F5 Distributed Cloud AIP can identify a wide range of anomalous behaviors that indicate malicious activity, including insider threats, external threats and potential data loss risks, in both applications and infrastructure, Ford says. says Mr.
In addition, F5 includes the option to make available a suite of F5 Distributed Cloud AIP managed security services through F5-managed Security Operations Centers (SOCs) and F5 Distributed Cloud AIP Insights. F5 Distributed Cloud AIP Insights is an analytics platform that puts cloud security experts at your fingertips.
The overall goal is to provide a unified zero-trust approach to cybersecurity that uses machine learning algorithms to track the identities of users, applications and machines across distributed computing environments, says Ford. says Mr. Cybersecurity Today The challenge his team faces is that companies don’t slow down their pace of innovation. As such, he noted that his team in cybersecurity has a responsibility to find ways to maintain policies in a constantly evolving IT environment.
This approach is necessary because cybercriminals now regularly launch attacks across multiple attack vectors, Ford added.
Additions to the F5 cloud platform are the latest example of continued integration of capabilities that improve cybersecurity while reducing overall costs. In addition to cost-cutting mandates, many cybersecurity teams still struggle to find and retain expertise. A cloud platform allows these teams to maintain a layered, defense-in-depth approach to cybersecurity in a way that doesn’t require many point products that must be managed separately, Ford said.
Of course, there is no shortage of options when it comes to centralizing cybersecurity management in the cloud era. It’s less clear how much cybersecurity teams will continue to rely on point products as centralization gains momentum. Many cybersecurity teams are reluctant to replace platforms that have been specifically tailored to their environment for years. However, you may not know which rules and policies have been implemented by successive administrators.
Regardless of approach, most organizations will review their cybersecurity strategies in at least 2023. Perfect security may not exist, but if an organization fails to adapt to evolving threats, it will almost certainly experience negative consequences.