SlideShare a Scribd company logo
4
Most read
6
Most read
10
Most read
Introduction to
F5 Silverline Web Application
Firewall (WAF)
April 2015
© F5 Networks, Inc 2
Today’s application infrastructure
Most applications are
Web applications
Cloud and SaaS
based applications
are being deployed more than,
and faster than, ever before
Users are going
Mobile
© F5 Networks, Inc 3
Customers need a more operationally and
cost efficient way to protect web applications
across multiple environments without scaling
out IT infrastructure and staff.
Maintain
compliance
(PCI DSS)
Defend against
Layer 7 attacks
Secure data
and web
applications
© F5 Networks, Inc 4
Recognized as the most
scalable WAF on the
market
Deployed in more
datacenters worldwide
than any other WAF
Now available as an
enterprise-grade cloud-
based service managed
by F5 Security
Operations Center
(SOC) experts
F5’s web application firewall portfolio
Built on BIG-IP ASM
VIPRION Platform BIG-IP Platform BIG-IP Virtual Edition F5 Silverline
WAF
© F5 Networks, Inc 5
Protect web applications and data from layer 7 attacks, and enable compliance,
such as PCI DSS, with the Silverline Web Application Firewall service which is
built on BIG-IP Application Security Manager and backed by 24x7x365 support
from F5 experts.
Silverline Web Application Firewall (WAF)
Proven security effectiveness as a convenient cloud-based service
Legitimat
e
User
L7 Protection:
Geolocation attacks, DDoS,
SQL injection, OWASP Top
Ten attacks, zero-day threats,
AJAX applications, JSON
payloads
Public Cloud
Hosted Web
App
Private Cloud
Hosted Web
App
VA/DAST
Scans
Policy can be built
from 3rd Party
DAST
Web Application
Firewall Services
W
AF
Cloud
Physical Hosted
Web App
Attackers F5 Silverline
WAF
© F5 Networks, Inc 6
Key benefits
Reduce operating
costs
Protect web apps,
anywhere
Leverage proven
security efficacy
Rapidly deploy WAF
protections and drive
operational and cost
efficiencies by outsourcing
WAF policy management to
F5 security experts.
Protect web apps, no matter
where they reside with
consistent policies across
hybrid environments in
conjunction with BIG-IP
deployments.
Protect against critical web
attacks with an enterprise-
grade service built on BIG-IP
ASM which is recommended
by NSS Labs with 99.89%
overall security
effectiveness*.
Source: NSS Labs Web Application Firewall Product Analysis. F5 BIG-IP ASM 10200 V11.4.0. https://interact.f5.com/2015ALLF-NSS-Web-App-Firewall--Analysis-for-BIG-IP-ASM_2---
Reg.html
© F5 Networks, Inc 7
recommends BIG-IP ASM
Web Application Firewall when
compared with competitors:
Overall security
effectiveness
%
99.89
Minimal false positives
%
.124
Enterprise-grade protection against
layer 7 geolocation attacks, DDoS,
SQL injection, OWASP Top Ten
attacks, zero-day threats, AJAX
applications, and JSON payloads
delivered as a convenient cloud-
based service.
Leverage proven security efficacy
An enterprise-grade web application firewall service
Source: NSS Labs Web Application Firewall Product Analysis. F5 BIG-IP ASM 10200 V11.4.0. https://interact.f5.com/2015ALLF-NSS-Web-App-Firewall--Analysis-for-BIG-IP-ASM_2---
Reg.html
© F5 Networks, Inc 8
F5 security experts proactively monitor,
and fine-tune policies to protect web
applications and data from new and
emerging threats.
• Expert policy setup
• Policy fine-tuning
• Proactive alert monitoring
• False positives tuning
• Detection tuning
• Whitelist / Blacklist Set up and
monitoring
Availability & Support
Expert Policy Setup and
Management
Active Threat Monitoring
Reduce operating costs
by outsourcing WAF policy management to F5 SOC experts
F5 Security Operations Center
© F5 Networks, Inc 9
Protect web apps, anywhere
Easily extend WAF protections to SaaS and cloud apps
Protect web apps, no matter where they reside with consistent policies and
compliance across hybrid environments, in conjunction with BIG-IP
deployments.
F5 Networks: Introduction to Silverline WAF (web application firewall)

More Related Content

PDF
Secure Access – Anywhere by Prisma, PaloAlto
PDF
Demystifying Prisma Access
PPTX
Fortinet Icon Library
PPTX
Endpoint Security Pres.pptx
PPTX
Microsoft Threat Protection
PDF
Google Cloud Networking Deep Dive
PDF
F5 TLS & SSL Practices
PDF
Understanding Cisco’ Next Generation SD-WAN Technology
Secure Access – Anywhere by Prisma, PaloAlto
Demystifying Prisma Access
Fortinet Icon Library
Endpoint Security Pres.pptx
Microsoft Threat Protection
Google Cloud Networking Deep Dive
F5 TLS & SSL Practices
Understanding Cisco’ Next Generation SD-WAN Technology

What's hot (20)

PPTX
Cisco Identity Services Engine (ISE)
PPTX
F5 Intelligent DNS Scale
PPTX
Issues of OpenStack multi-region mode
PDF
Aruba Networks - Overview ClearPass
PPT
Fortigate Training
PDF
TechWiseTV Workshop: Cisco SD-WAN
PDF
F5 Networks: architecture and risk management
PDF
VLAN vs VXLAN
PDF
Microsoft 365 Compliance and Security Overview
PPTX
Microsoft Information Protection.pptx
PPTX
Building IAM for OpenStack
PPTX
Google Cloud Fundamentals by CloudZone
PPTX
Check Point Solutions Portfolio- Detailed
PPTX
Building a Stretched Cluster using Virtual SAN 6.1
PPTX
An Intrudction to OpenStack 2017
PPT
Introduction to ThousandEyes
PPTX
AWS Cloud Security
PPTX
OpenStack Architecture and Use Cases
PDF
Apstra AOSによるEVPN-VXLANの自動化
PPTX
FortiGate_Sec_02_Security Fabric (1).pptx
Cisco Identity Services Engine (ISE)
F5 Intelligent DNS Scale
Issues of OpenStack multi-region mode
Aruba Networks - Overview ClearPass
Fortigate Training
TechWiseTV Workshop: Cisco SD-WAN
F5 Networks: architecture and risk management
VLAN vs VXLAN
Microsoft 365 Compliance and Security Overview
Microsoft Information Protection.pptx
Building IAM for OpenStack
Google Cloud Fundamentals by CloudZone
Check Point Solutions Portfolio- Detailed
Building a Stretched Cluster using Virtual SAN 6.1
An Intrudction to OpenStack 2017
Introduction to ThousandEyes
AWS Cloud Security
OpenStack Architecture and Use Cases
Apstra AOSによるEVPN-VXLANの自動化
FortiGate_Sec_02_Security Fabric (1).pptx
Ad

Viewers also liked (20)

PPTX
F5 - BigIP ASM introduction
PDF
Configuration F5 BIG IP ASM v12
PDF
F5 ASM v12 DDoS best practices
PPTX
F5 BIG-IP Web-based Customer Training
PPTX
LTM essentials
PPT
BIG IP F5 GTM Presentation
PDF
Using Docker container technology with F5 Networks products and services
PPTX
F5 Networks Quick Poll Research: HTTP/2 Survey Results
PPTX
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
PDF
F5 study guide
PPTX
F5 Application Services Reference Architecture
PPTX
F5’s VMware Horizon View Reference Architecture
PPTX
F5 Application Services Reference Architecture (Audio)
PDF
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
PPTX
All 50 Ways to Use BIG-IP
PDF
Presentation f5 – beyond load balancer
PPTX
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
PPTX
F5 Networks Intelligent DNS Scale
PPTX
F5 Certified! Program Overview and Update
PDF
Partie II – ASM Application Security Manager
F5 - BigIP ASM introduction
Configuration F5 BIG IP ASM v12
F5 ASM v12 DDoS best practices
F5 BIG-IP Web-based Customer Training
LTM essentials
BIG IP F5 GTM Presentation
Using Docker container technology with F5 Networks products and services
F5 Networks Quick Poll Research: HTTP/2 Survey Results
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
F5 study guide
F5 Application Services Reference Architecture
F5’s VMware Horizon View Reference Architecture
F5 Application Services Reference Architecture (Audio)
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
All 50 Ways to Use BIG-IP
Presentation f5 – beyond load balancer
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
F5 Networks Intelligent DNS Scale
F5 Certified! Program Overview and Update
Partie II – ASM Application Security Manager
Ad

Similar to F5 Networks: Introduction to Silverline WAF (web application firewall) (20)

PDF
Firewall seguro, proteção para aplicações
PDF
F5 Web Application Security
PDF
Why Do You Need a Web Application Firewall?
PPTX
BIG-IP Data Center Firewall Solution
PPTX
PPTX
PPTX
2019-F5-Line-Card.pptx
PPTX
F5 Infosec Israel 2013 Application Centric Security
PDF
Are you fighting_new_threats_with_old_weapons
PPTX
Cloud Web Application Firewall - GlobalDots
PPTX
Get more versatile and scalable protection with F5 BIG-IP
PPT
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
PDF
Web Application Firewall_ Solution to Reduce Cyber Attacks _ CyberPro Magazin...
PDF
WEB SERVERS
PDF
Azure F5 Solutions
PPTX
WAFs.pptx
PDF
8 Key Considerations in Choosing the Right WAF
PPT
20070605 Radware
PDF
Firewall seguro, proteção para aplicações
F5 Web Application Security
Why Do You Need a Web Application Firewall?
BIG-IP Data Center Firewall Solution
2019-F5-Line-Card.pptx
F5 Infosec Israel 2013 Application Centric Security
Are you fighting_new_threats_with_old_weapons
Cloud Web Application Firewall - GlobalDots
Get more versatile and scalable protection with F5 BIG-IP
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
Web Application Firewall_ Solution to Reduce Cyber Attacks _ CyberPro Magazin...
WEB SERVERS
Azure F5 Solutions
WAFs.pptx
8 Key Considerations in Choosing the Right WAF
20070605 Radware

More from F5 Networks (19)

PDF
F5 networks the_expectation_of_ssl_everywhere
PPTX
Ensure Application Availability Between Hybrid Data Centers
PDF
F5 Networks: The Internet of Things - Ready Infrastructure
PDF
F5 Networks Threat Analysis: Madness
PDF
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
PPTX
Key Findings from the State of Application Delivery 2015
PDF
The F5 Networks Application Services Reference Architecture (White Paper)
PDF
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
PDF
The F5 DDoS Protection Reference Architecture (Technical White Paper)
PDF
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
PDF
DNS: Challenges in a Changing Landscape (Infographic)
PPTX
Operationalize all the Network Things
PPTX
5 Ways to use Node in the Network
PPTX
F5’s VMware Horizon View Reference Architecture
PPTX
The DNS of Things
PPTX
BIG-IP Policy Enforcement Manager
PPTX
BIG-IP ADCs and ADF
PPTX
BIG-IP 4200v Hardware Platform
PPTX
F5's IP Intelligence Service
F5 networks the_expectation_of_ssl_everywhere
Ensure Application Availability Between Hybrid Data Centers
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks Threat Analysis: Madness
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Key Findings from the State of Application Delivery 2015
The F5 Networks Application Services Reference Architecture (White Paper)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
DNS: Challenges in a Changing Landscape (Infographic)
Operationalize all the Network Things
5 Ways to use Node in the Network
F5’s VMware Horizon View Reference Architecture
The DNS of Things
BIG-IP Policy Enforcement Manager
BIG-IP ADCs and ADF
BIG-IP 4200v Hardware Platform
F5's IP Intelligence Service

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Encapsulation theory and applications.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
KodekX | Application Modernization Development
PPTX
Cloud computing and distributed systems.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
MYSQL Presentation for SQL database connectivity
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Encapsulation theory and applications.pdf
Modernizing your data center with Dell and AMD
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
Spectral efficient network and resource selection model in 5G networks
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
KodekX | Application Modernization Development
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Monthly Chronicles - July 2025

F5 Networks: Introduction to Silverline WAF (web application firewall)

  • 1. Introduction to F5 Silverline Web Application Firewall (WAF) April 2015
  • 2. © F5 Networks, Inc 2 Today’s application infrastructure Most applications are Web applications Cloud and SaaS based applications are being deployed more than, and faster than, ever before Users are going Mobile
  • 3. © F5 Networks, Inc 3 Customers need a more operationally and cost efficient way to protect web applications across multiple environments without scaling out IT infrastructure and staff. Maintain compliance (PCI DSS) Defend against Layer 7 attacks Secure data and web applications
  • 4. © F5 Networks, Inc 4 Recognized as the most scalable WAF on the market Deployed in more datacenters worldwide than any other WAF Now available as an enterprise-grade cloud- based service managed by F5 Security Operations Center (SOC) experts F5’s web application firewall portfolio Built on BIG-IP ASM VIPRION Platform BIG-IP Platform BIG-IP Virtual Edition F5 Silverline WAF
  • 5. © F5 Networks, Inc 5 Protect web applications and data from layer 7 attacks, and enable compliance, such as PCI DSS, with the Silverline Web Application Firewall service which is built on BIG-IP Application Security Manager and backed by 24x7x365 support from F5 experts. Silverline Web Application Firewall (WAF) Proven security effectiveness as a convenient cloud-based service Legitimat e User L7 Protection: Geolocation attacks, DDoS, SQL injection, OWASP Top Ten attacks, zero-day threats, AJAX applications, JSON payloads Public Cloud Hosted Web App Private Cloud Hosted Web App VA/DAST Scans Policy can be built from 3rd Party DAST Web Application Firewall Services W AF Cloud Physical Hosted Web App Attackers F5 Silverline WAF
  • 6. © F5 Networks, Inc 6 Key benefits Reduce operating costs Protect web apps, anywhere Leverage proven security efficacy Rapidly deploy WAF protections and drive operational and cost efficiencies by outsourcing WAF policy management to F5 security experts. Protect web apps, no matter where they reside with consistent policies across hybrid environments in conjunction with BIG-IP deployments. Protect against critical web attacks with an enterprise- grade service built on BIG-IP ASM which is recommended by NSS Labs with 99.89% overall security effectiveness*. Source: NSS Labs Web Application Firewall Product Analysis. F5 BIG-IP ASM 10200 V11.4.0. https://interact.f5.com/2015ALLF-NSS-Web-App-Firewall--Analysis-for-BIG-IP-ASM_2--- Reg.html
  • 7. © F5 Networks, Inc 7 recommends BIG-IP ASM Web Application Firewall when compared with competitors: Overall security effectiveness % 99.89 Minimal false positives % .124 Enterprise-grade protection against layer 7 geolocation attacks, DDoS, SQL injection, OWASP Top Ten attacks, zero-day threats, AJAX applications, and JSON payloads delivered as a convenient cloud- based service. Leverage proven security efficacy An enterprise-grade web application firewall service Source: NSS Labs Web Application Firewall Product Analysis. F5 BIG-IP ASM 10200 V11.4.0. https://interact.f5.com/2015ALLF-NSS-Web-App-Firewall--Analysis-for-BIG-IP-ASM_2--- Reg.html
  • 8. © F5 Networks, Inc 8 F5 security experts proactively monitor, and fine-tune policies to protect web applications and data from new and emerging threats. • Expert policy setup • Policy fine-tuning • Proactive alert monitoring • False positives tuning • Detection tuning • Whitelist / Blacklist Set up and monitoring Availability & Support Expert Policy Setup and Management Active Threat Monitoring Reduce operating costs by outsourcing WAF policy management to F5 SOC experts F5 Security Operations Center
  • 9. © F5 Networks, Inc 9 Protect web apps, anywhere Easily extend WAF protections to SaaS and cloud apps Protect web apps, no matter where they reside with consistent policies and compliance across hybrid environments, in conjunction with BIG-IP deployments.