Reimagining Public Sector Analytics
Home News Cyber Security F5 launches a set of security products for ensuring application security

F5 launches a set of security products for ensuring application security

New solutions give customers the protection and intelligence required to keep applications and user data secure

Global app tech firm has launched a set of security products aimed at ensuring application security for the digital economy. Company said in a statement that in a digital-driven economy, applications deliver business services for a variety of access points and locations, opening up new risks and attack vectors—particularly as IT teams extend security and encryption capabilities across cloud, data center, and hybrid environments.

With these elements in mind, F5 is adding a dedicated protection with F5's new Herculon security product line. Tthe new Herculon product family will help security administrators quickly deploy solutions that overcome specific application security obstacles and threats, said company.

“Business leaders across different sectors are increasingly cognizant of how powerful applications and data assets can be in the journey to achieving agility demanded from the shift to the digital economy,” said Mohan Veloo, CTO, Asia Pacific, F5 Networks.

“However, the breakneck pace of innovation and adoption of connected devices, and an insatiable appetite for new technology introduces new problems in the form of increased attack vectors to the broader economy. More than ever, organizations need to rethink traditional security architectures, to focus on areas of greatest vulnerabilities – their applications and users.”

The majority of web/application traffic is now encrypted, meaning any attempts to address application security via traditional methods alone are severely limited. As a result of widespread encryption—including its nefarious use as part of complex, targeted attacks—protecting customers and data now requires deep insight into application traffic and user behavior, sophisticated threat intelligence and response strategies, and practical access controls for applications and data.

Exit mobile version