Head Solutions and Innovations at a tech services company with 11-50 employees
Real User
2020-07-19T08:15:51Z
Jul 19, 2020
We primarily use the solution for DDoS protection. We use it as a multivector environment model. We are a system integrator so we have the opportunity to engage multiple customers. On the side of infrastructure protection, infrastructure monitoring, or infrastructure protection for application infrastructure protection, we use this. It's the very first point of call for attacks as it is at the edge of the system you have to protect. The F5 has what we call a Hybrid Defender, which is a DDoS platform. It operates at the edge of our network or traffic to prevent attacks based on signatures. It also works in a hybrid configuration with solutions and has a very good hybrid configuration with the cloud platform, which handles scrubbing. If there is a rudimentary attack it can intelligently signal the cloud and redirect traffic to the cloud where that attack can be fully mitigated before clean traffic is passed on to the user.
Distributed Denial of Service (DDOS) Protection Software is a category of software solutions designed to defend against and mitigate the impact of DDOS attacks.
We primarily use the solution for DDoS protection. We use it as a multivector environment model. We are a system integrator so we have the opportunity to engage multiple customers. On the side of infrastructure protection, infrastructure monitoring, or infrastructure protection for application infrastructure protection, we use this. It's the very first point of call for attacks as it is at the edge of the system you have to protect. The F5 has what we call a Hybrid Defender, which is a DDoS platform. It operates at the edge of our network or traffic to prevent attacks based on signatures. It also works in a hybrid configuration with solutions and has a very good hybrid configuration with the cloud platform, which handles scrubbing. If there is a rudimentary attack it can intelligently signal the cloud and redirect traffic to the cloud where that attack can be fully mitigated before clean traffic is passed on to the user.