Like all vulnerabilities that make the news, the recent MOVEit vulnerability might tempt enterprises to quickly jump in a very tactical manner. Similarly, it might even cause vendors to shift into an “ambulance chaser” mode. Despite the pressure to react tactically, a strategic response is a far better approach.
Application and API security is a topic that is of the utmost importance for enterprises. It is also a somewhat complex topic that is easier to discuss than it is to get right. Because of this, enterprises typically work with a strategic partner to ensure that they are protected from the widest variety of threats—from the very elementary to the extremely sophisticated. In particular, in state government, local government, and higher education (SLED), there is a lot of prized, sensitive data that motivated attackers are eager to access.
Before we can protect our applications and APIs, we need to know what they are and where they are. This is called API discovery. Despite our best efforts to control and monitor the development and deployment life cycle, unknown cases of infrastructure, applications, and APIs are always popping up without the knowledge or support of IT and security. It is because of this that discovery is so important.
Assuming we have a decent handle on what applications and APIs we have and where they are, we can move to focus on protecting those applications and APIs from security and fraud threats. This includes protecting them from exploitation of vulnerabilities, fraud/business logic abuse, unauthorized access, breaches, theft of PII or other sensitive data, and automated attacks. A trusted partner that specializes in this advanced level of protection can be a tremendous asset to an enterprise.
Some examples of these advanced protection capabilities include app proxies, rate limiting and fast Access Control Lists (ACLs), WAF, DDoS protection, bot defense, auto-certificates, malicious user detection, URI routing, service policies, synthetic monitors, TLS fingerprinting, device identification, cross-site request forgery protection, and others.
Working with a trusted partner helps enterprises ensure that they are better protected against yesterday’s, today’s, and tomorrow’s attack headlines, rather than only against the hot news item of the day. Today’s news item will quickly be replaced with tomorrow’s, and enterprises that are not prepared for that will face the same tactical fire drill all over again.
See this resource for more information and contact the F5 team to schedule a demo.
About the Author
Related Blog Posts

F5 ADSP Partner Program streamlines adoption of F5 platform
The new F5 ADSP Partner Program creates a dynamic ecosystem that drives growth and success for our partners and customers.

Accelerate Kubernetes and AI workloads with F5 BIG-IP and AWS EKS
The F5 BIG-IP Next for Kubernetes software will soon be available in AWS Marketplace to accelerate managed Kubernetes performance on AWS EKS.
F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.
F5 Silverline Mitigates Record-Breaking DDoS Attacks
Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.
Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.