Who is it suitable for?
As the number of web applications continues to soar, an increasing amount of sensitive data is at risk of theft, vulnerability or other attacks. With BIG-IP ASM and AWAF, you can protect yourself from the OWASP top 10 threats, DDoS and botnet attacks, and plenty of other attack vectors.
Range of functions
With BIG-IP ASM and AWAF, you can protect your online presence and applications against a fair few threats. The range of functions includes:
F5 protects against the OWASP top 10 threats and shows how compliant your security policy is against these 10 attack vectors. Reports can be prepared in ASM to show the compliance status with the PCI Standard.
The ASM policy templates include a comprehensive range of templates that can be quickly and easily configured for the likes of:
- API Security
- Microsoft OWA and SharePoint
- SAP NetWeaver
Common attacks such as SQL injection, path traversal, binary execution and many more are blocked with over 5,000 attack signatures.
iRules allows you to extend the F5’s range of functions to include programmable scripts. For all requirements that cannot be met by the ASM and AWAF standard functionalities, we are happy to check whether they can be implemented using iRules.
Event logs and reports make tracking and noticing illegal activity an absolute breeze.
- Layer 7 DDoS (L3–L7 with F5 Silverline)
- Session hijacking
- Cookie manipulation
- Bot defence
A complete list of ASM and AWAF functionalities can be found in the product sheet.
Submit your email address and we will get in touch with you shortly
Are you interested in our solution?
Learn more about our solution
Vendors & Certifications
Pioneering products and solutions from the world’s leading vendors
F5 Networks established its reputation through its leading load balancer technology. Today F5 Networks’ BIG-IP platform offers various options to increase the trustworthiness and availability of applications. These include the global BIG-IP DNS load balancing solution for location-based acceleration and protection of IP DNS access, the intelligent application load balancer Local Traffic Manager (LTM), the web application firewall Application Security Manager (ASM), the ‘zero click’ remote access solution Application Access Policy Manager (APM) and WebSafe for access to web applications from non-trusted endpoints.