A Secure Equinix Gateway to the Cloud

  • Share via AddThis
The Challenge

Enterprises are leveraging colocation and associated interconnect services such as those provided by Equinix to reduce not only infrastructure and connection costs but also latency. By connecting to multiple clouds, many organizations take advantage of pricing differentials and customer proximity, only to encounter difficulty controlling access and providing enterprise-class traffic management, security compliance, DDoS protection, SSL termination, and L4 and web application firewall services.

The Solution

F5 BIG-IP products provide secure access and compliance from the data center to the cloud, including public clouds accessed via Equinix colocation and interconnect services. Large enterprises and public-sector organizations use the BIG-IP platform to provide high-performance traffic management, security services, and high availability for mission-critical applications, wherever those apps are deployed.

Organizations looking to move and deploy applications to the cloud can deploy BIG-IP products into an Equinix Performance Hub to manage access, security, and traffic to and from Equinix Cloud Exchange. Performance Hub is a layer 2 VLAN at the edge of the network. Deploying services at this gateway to Cloud Exchange provides seamless, low latency (< 1 millisecond) transit to public clouds such as Amazon Web Services and Microsoft Azure, as well as numerous SaaS services. The joint solution provides a layer of abstraction, a secure cloud gateway through which organizations can migrate or deploy apps and manage multiple clouds without disruption. Customers using this architecture can save significantly, compared to the cost of direct connections. They also benefit from a single point of entry and exit between the public cloud and the corporate network.

F5 Helps You:

In addition to secure access and compliance, BIG-IP products can provide:

  • A bi-directional web application firewall to protect applications both inside the corporate infrastructure and in the cloud.
  • SSL termination and content inspection to defeat attack vectors in SSL traffic.
  • DDoS protection from volumetric attacks.