Teach Your WAF Kung Fu

F5 Ecosystem | January 14, 2021

The current pandemic has led businesses to rely on digitization more than ever. The rise of reliance on applications also means that Information Security leaders are strengthening the defenses for their apps.

Web application firewalls (WAFs) serve as the necessary first line of defense; however, “A well-monitored, configured, and updated web application firewall (WAF) should also be able to stop threat actors from exploiting vulnerable systems within a network.” – F5 Labs

As F5 Labs notes, nearly three critical vulnerabilities are released each day. So, how can you empower your WAF to deal with targeted attacks from these advanced threats?

Advanced threats require an advanced WAF equipped with live and actionable threat intelligence to make security controls smarter—controls that automatically detect and block active attack campaigns and malware.

Consider the landmark 1999 science fiction action film (and its many subsequent memes), The Matrix, where Neo (Keanu Reeves) is plugged into a machine that can instantly upload a lifetime’s worth of martial arts training directly into his brain. After the update, Neo wakes up and declares, “I know kung fu!”

While certainly not there yet for humans, it does seem that similar elements are getting much closer to reality when it comes to tech.

For instance, last year F5 released Threat Campaigns subscription as an add-on service to F5 Advanced WAF. The service helps protect applications and IT infrastructure from sophisticated attacks by detecting and blocking attacks proactively.

In the movie, The Matrix, Neo can quickly get updates for programs like kung fu to enhance his combat skills. F5 intelligence services such as Threat Campaigns can be easily added to your WAF and automate security to detect and block threats. F5 provides better security efficacy with near-zero false positives to improve enterprise web application security. For example, Threat Campaigns thwarted about 1295 attacks in 2020.

Key Benefits:

  • Live updates with actionable threat intelligence from F5
  • Improved web application security with near-zero false positives
  • Cost-effective model for confident risk mitigation
  • No more threat hunting

Empower your BIG-IP with F5 intelligence services to mitigate against targeted attack campaigns. You can configure Advanced WAF to automate mitigation for these new and ongoing threats—teaching your WAF kung fu to combat modern and emerging threats.

Share

About the Author

Navpreet Gill
Navpreet GillSenior Product Marketing Manager

More blogs by Navpreet Gill

Related Blog Posts

The everywhere attack surface: EDR in the network is no longer optional
F5 Ecosystem | 11/12/2025

The everywhere attack surface: EDR in the network is no longer optional

All endpoints can become an attacker’s entry point. That’s why your network needs true endpoint detection and response (EDR), delivered by F5 and CrowdStrike.

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 Ecosystem | 11/11/2025

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift

F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us