RSA: Building an Application Security Ecosystem

F5 Ecosystem | February 09, 2017

At F5, we talk a lot about concepts like the changing threat landscape and the dissolving perimeter – that applications and user identities are increasingly the primary targets of malicious attacks because these are the new gateways to valuable corporate data. This is why we are focused on what we call application-centric security. We believe that security solutions need to be an integrated, intrinsic, dedicated part of application protection, access and identity management.

We recognize this is a huge shift for customers. To adapt in this new world, they need to first understand the nature of the new threats they face, then conduct a full assessment of where they are vulnerable and prioritize the highest risk areas. And finally, find the right people, obtain the right tools and establish the right processes to ensure they are protected. It’s a monumental task undertaken by security teams performing in high pressure environments, and as vendors we need to work together to help them address these challenges.

That’s because every company has unique challenges that require unique solutions. Put another way, there no such thing as a one-size-fits-all approach to security. There is no way for F5 – or any other vendor – to solve every challenge for every customer. This is why our solutions are platform agnostic, why we use open APIs and why we are so committed to building a strong ecosystem of security partners.

Our mission is to help these security teams protect their applications – wherever they are – and ensure users can access them securely from any device. All of our partners are equally committed to this mission and together help us deliver what we consider the three essential elements of application security:

  • Visibility. A fundamental principle of security is that you can’t protect what you don’t know. To “know,” you first have to be able to “see.” That means you need visibility into all your application traffic.
  • Context. Visibility is essentially meaningless without context—an understanding of all the characteristics of the applications you’re protecting and the “outside forces” that can affect your ability to protect them. Context is what enables insight.
  • Control. Once you have context, it’s essential you have the ability to apply the right security controls. Without control, it doesn’t matter how much visibility or context you have.

We view our partnerships as true extensions of our work – as parts of a whole that delivers these critical elements to our mutual customers. Take visibility. Our recently launched Herculon SSL Orchestrator, a product purpose-built to eliminate SSL blind spots and integrate with a vast number of popular standalone network security and advanced threat management solutions to enhance enforcement capabilities, heighten detection capabilities, and improve network operations and orchestration. This is just one example of how work hand-in-hand with a broad range of partners. Partners like FireEye, to enhance visibility into encrypted traffic to better mitigate persistent threats; Webroot, to provide broader context and insight into those threats, and Oktato deliver even greater levels of control over access to applications and data.

As I look forward to RSA next week, this is what I’m most excited about. It’s a chance for us and our partners to connect with customers, talk about how they are tackling this shift and the challenges they face. Our F5 Labs team will be on the ground and our booth will feature compelling threat intelligence presentations from people across F5 and a number of our partners. It’s going to be a great week. You can find us in booth #S1515 or @F5Security on Twitter.

Share
Tags: 2017

About the Author

Related Blog Posts

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

F5 Silverline: Our Data Centers are your Data Centers
F5 Ecosystem | 06/22/2021

F5 Silverline: Our Data Centers are your Data Centers

Customers count on F5 Silverline Managed Security Services to secure their digital assets, and in order for us to deliver a highly dependable service at global scale we host our infrastructure in the most reliable and well-connected locations in the world. And when F5 needs reliable and well-connected locations, we turn to Equinix, a leading provider of digital infrastructure.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

The Internet of (Increasingly Scary) Things
F5 Ecosystem | 12/16/2015

The Internet of (Increasingly Scary) Things

There is a lot of FUD (Fear, Uncertainty, and Doubt) that gets attached to any emerging technology trend, particularly when it involves vast legions of consumers eager to participate. And while it’s easy enough to shrug off the paranoia that bots...

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us
RSA: Building an Application Security Ecosystem | F5