You are on page 1of 2

BIG‑IP Application Security Manager

PRODUCT OVERVIEW

“F5 has really helped us become


more aggressive in tuning our
devices for our security needs, and
as a result, [the device] does a
much better job of blocking bad
traffic while allowing valid traffic.”
Stuart Lyons, Security Engineer, Human Kinetics

Defend Against Attacks and Achieve


Regulatory Compliance

Key benefits
· Ensure application availability by stopping · Get out-of-the-box application security · Deploy flexibly for virtualized and private
hackers and attacks policies with minimal configuration cloud environments
· Reduce the cost of security compliance · Improve application security and performance · Increase agility

As more application traffic moves over the web, sensitive data is exposed to
potential theft, security vulnerabilities, and multi-layer attacks. Protect your
organization and its reputation by maintaining the confidentiality, availability,
and performance of the applications that are critical to your business.

F5 BIG IP® Application Security Manager™ (ASM) is a flexible web application


firewall that secures web applications in traditional, virtual, and private cloud
environments. BIG IP ASM provides unmatched application and website
protection, a complete attack expert system, and compliance for key regulatory
mandates—all on a platform that consolidates application delivery with network
and application access and optimization.
Deliver comprehensive security changes, or rewrites. Detailed PCI reporting performance advantages, including SSL
determines if PCI DSS compliance is being offload, caching, compression, TCP
BIG‑IP ASM patches web application
met and provides steps required to become optimization, and more. BIG-IP ® Local
vulnerabilities in minutes to protect from
compliant if not. Traffic Manager ™ integration enables
a broad spectrum of threats, including
protection from (D)DoS and other network
the latest (D)DoS and SQL injection attacks.
Get out-of-the-box protection attacks. And because BIG‑IP ASM works
It also secures the latest interactive web
on the same platform with other BIG‑IP ®
applications such as JSON payloads and Equipped with a set of pre-built and
modules, you can benefit from centralized
AJAX widgets. A complete attack expert certified application security policies,
access control and even greater
system provides on-the-spot attack details, BIG‑IP ASM gives you out-of-the box
performance improvements.
staging of new policies for testing, and protection for common applications such
quick administrator notification. BIG-IP ASM as Microsoft Outlook Web Access, Lotus
Deploy flexibly and increase
stops hackers and attacks and ensures Domino Mail Server, Oracle E-Business business agility
legitimate users can access applications. Financials, and Microsoft Office SharePoint.
A rapid deployment policy secures any BIG-IP ASM Virtual Edition deploys in flexible
Achieve compliance cost-effectively internal or third-party application. environments, protecting your virtual and
private cloud applications. By automatically
Advanced, built-in security protection and building and managing security policies
Improve performance
remote auditing help your organization around newly discovered vulnerabilities,
comply with industry security standards, Unlike many other security s olutions, BIG-IP ASM deploys fast, agile business
including PCI DSS, HIPAA, Basel II, and with BIG‑IP ASM you don’t have to choose processes to secure your applications against
SOX, in a cost-effective way—without between security and performance. constantly changing threats.
requiring multiple appliances, application F5 TMOS® architecture provides significant

BIG‑IP ASM features Learn more about BIG‑IP ASM


· PCI reporting · iRules For more information about BIG‑IP ASM,
· Integrated XML firewall · TCP/IP optimization use the search function on f5.com to find
· DataGuard™ and cloaking · L7 Rate Shaping™ these resources.

· Live update for attack signatures · Isolated resource allocation (vCMP) Datasheets
· Web scraping protection · iApp™ for pre-configured policies BIG‑IP ® Application Security Manager ™
· Web services encryption/decryption · Application visibility and reporting BIG‑IP ® Add-On Modules
·A
 pplication policy templates
· ICAP support for SMTP and SOAP files · Comprehensive attack protection White papers
· BIG‑IP modules layering · Cross-site request forgery Intelligent Layer 7 DoS and Brute Force
Protection for Web Applications
· iRules® and Fast Cache integrations · Layer 7 (D)DoS
Application and Data Security with
· WhiteHat Sentinel integration · Cross-site scripting
F5 BIG-IP ASM and Oracle Database Firewall
· BIG-IP ASM Virtual Edition (VE) · SQL injection
· Application security in the private cloud · Parameter and HPP tampering Case study
· Metrics on the BIG-IP Dashboard · Session highjacking Human Kinetics Boosts Website Performance,
· Cookie manipulation Security, and Innovation with F5 Solution
· F5 TMOS architecture · Forceful browsing
Article
· SSL offload · XML bombs/DoS
SC Magazine, 2010 Reader Trust Award for
· Caching and compression Best Web Application Security

F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888-882-4447 www.f5.com

F5 Networks, Inc. F5 Networks F5 Networks Ltd. F5 Networks


Corporate Headquarters Asia-Pacific Europe/Middle-East/Africa Japan K.K. IT agility. Your way.
info@f5.com apacinfo@f5.com emeainfo@f5.com f5j-info@f5.com

© 2011 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, ARX, FirePass, iControl, iRules, TMOS, and VIPRION
are registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. CS04-00016 0711

You might also like