F5 -Large Business

Report
CONFIDENTIAL
CDCA'S SMALL BUSINESS AND INDUSTRY
OUTREACH INITIATIVE
"SBIOI 29"
John Manning, Federal Account Manager
July 18, 2013
Question 1: The name F5 originated from:
a) It’s the 5th letter in the alphabet
b) The computer function F5 key, to fire up a
display
c) The movie Twister
Company Snapshot
•
Leading provider of Application
Delivery Networking products that
optimize the security, performance &
availability of network applications,
servers and storage systems
Revenue
400
Service
350
Product
300
250
Founded 1996 / Public 1999
•
Approx. 3,030 employees
•
FY11 Revenue: $1.2B
200
$ Millions
•
150
100
50
4Q12
3Q12
2Q12
1Q12
4Q11
3Q11
2Q11
FY12 Revenue: $1.4B
1Q11
•
4Q10
0
Gartner Magic Quadrant for ADC
"This Magic Quadrant graphic was published by Gartner, Inshould be evaluated in the context of the entire report. The Gartner report is available upon request
from F5."The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a
marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by
Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those
vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner
disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose
c. as part of a larger research note and
• F5's internal knowledgebase
and understanding of diverse
and complex application
environments makes it the
top choice for complex
environments.
• F5 has a broad and
comprehensive vision, with
industry-leading
understanding of the needs
of application development,
deployment and
management.
Gartner Magic Quadrant for SSL VPN
"This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from F5."The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and
for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended
solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose
Question 2: What is F5 best known for:
a) iRules
b) Load Balancer
c) Security
d) Mobile
Customization
“Stovepipes”
of Technology
iControl
iRules
Solutions
Security
Application
Load
Security
Balancing
Web
Application
Firewall
SOA
Access
CAC / PIV
SSO
Availability
SSL VPN
Traffic Management
Operating System
Application
VDI /
WAN
Acceleration
BYOD
Optimization
Application Delivery Services
Global
Load
Balancing
DNSSEC
IP v6
6:4|4:6
Question 3: F5 supports the following VDI :
a) VMware
b) Citrix
c) Microsoft
d) All of the Above
Full Proxy Security
F5’s Approach
Client / Server
Session
SSL inspection and SSL DDoS mitigation
Network
L4 Firewall: Full stateful policy enforcement and TCP DDoS mitigation
Application
TCP
OneConnect
SSL
Server
side
HTTP
Client
side
Client / Server
Web application
…
Proxy
HTTP proxy, HTTP DDoS and application security
SSL
TCP
Application
Application health monitoring and
performance anomaly detection
Traffic management microkernel
HTTP
IPv4/IPv6
Web application
APM
Firewall
Optional modules plug in for all F5 products and solutions
Session
Network
iRules
Physical
•
•
•
High-performance HW
TMOS traffic plug-ins
High-performance networking microkernel
Powerful application protocol support
•
•
iControl API
iControl—External monitoring and control
iRules—Network programming language
Physical
Question 4: What type’s of DDoS attacks does F5
protect against?
a) Simple Network Attacks: SYN Floods, Connection
Floods, UDP & CMP Floods
b) DNS Attacks: UDP Floods, NXDOMAIN Query Floods
c) HTTP Floods: Recursive-gets, Slowloris, SSL Attacks,
SSL Renegotiation
d) All of the Above
High Value Customer Support -Slash Response Times
Extensibility delivers protection sooner
Help needed
One hour later
One week later
DevCentral
request
F5 validates and posts
fix
Apache releases
fix
A user asks for help to avoid an
exploit on Apache
One hour later… the customer
deployed and validated the fix
One week later… testing and
rollout still needs to take place.
Question 5: DevCentral has approximately
how many members:
a) 10,000 users
b) 50,000 users
c) What’s DevCentral?
d) 110,000+ users
Small Business Quote- Tapestry Technologies
"As a small business providing IT services to the
federal government it is difficult to differentiate in a
highly competitive marketplace. Through partnering
with F5, we have been able to learn F5 products, pair
that with our knowledge of the customer's
environment and bring innovative solutions to our
customers. Partnering with F5 has helped us set
ourselves apart and brought huge benefits to Tapestry
Technologies."
F5 Networks and University of Phoenix
Collaborate to Create Application Delivery
Networking Certificate Program
• “One of the challenges is to find individuals with the
appropriate skill set and, more importantly, retaining the
people with these difficult-to-find skills, as there is a
recognized shortage and many with this skill will gravitate to
the vendor community,” wrote Mark Fabbi and Joe Skorupa of
Gartner. “The role played by the application delivery architect
demands strong people skills and broad technical skills.”
• http://www.f5.com/about/news/press/2013/20130709/
F5 GUARDIAN Professional Services Program
• Designed to help UNITY partners that have established consulting
and professional services practices achieve increased sales, higher
margins and more strategic customer relationships.
Benefits of the Guardian Program
• 20% off F5 Authorized Training Centers’ course list price
• Early access to F5 product technical training including a hosted lab
environment.
• Free F5 Professional Certification Program beta exam vouchers
• Invitation to participate in the Professional Services technical forum
• On-request access to F5 Professional Services assistance
• Visibility on the F5 corporate website
• Opportunity to participate in joint media outreach
• Access to select research on best practices for Professional Services
teams
Where we can use your help?
• Consider partnering with F5
• Engage Technical Architects, Security Architects, Enterprise
Architects, Virtualization, SharePoint, Web Apps, etc….
• Get Smart on BIG-IP
•
•
•
•
Free LTM Training
Lunch and Learns
Proof of Concepts
DevCentral
• Certified personnel supporting our platform, including Traffic
Management, Access Policy, Web Application Firewall, and more.
John Manning
(703) 898-4135
[email protected]
Visit us at the CDCA C5ISR SUMMIT November 12-15, 2013

similar documents