confidential cdca's small business and industry outreach initiative "sbioi 29" john...
Post on 18-Dec-2015
214 Views
Preview:
TRANSCRIPT
CONFIDENTIAL
CDCA'S SMALL BUSINESS AND INDUSTRY OUTREACH INITIATIVE
"SBIOI 29"
John Manning, Federal Account Manager
July 18, 2013
3CONFIDENTIAL © F5 Networks, Inc.
Question 1: The name F5 originated from:
a) It’s the 5th letter in the alphabet
b) The computer function F5 key, to fire up a display
c) The movie Twister
4CONFIDENTIAL © F5 Networks, Inc.
Company Snapshot• Leading provider of Application
Delivery Networking products that optimize the security, performance & availability of network applications, servers and storage systems
• Founded 1996 / Public 1999
• Approx. 3,030 employees
• FY11 Revenue: $1.2B
• FY12 Revenue: $1.4B0
50
100
150
200
250
300
350
400
4Q
10
1Q
11
2Q
11
3Q
11
4Q
11
1Q
12
2Q
12
3Q
12
4Q
12
$ M
illi
on
s
Service
Product
Revenue
5CONFIDENTIAL © F5 Networks, Inc.
Gartner Magic Quadrant for ADC
"This Magic Quadrant graphic was published by Gartner, Inshould be evaluated in the context of the entire report. The Gartner report is available upon request from F5."The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposec. as part of a larger research note and
• F5's internal knowledgebase and understanding of diverse and complex application environments makes it the top choice for complex environments.
• F5 has a broad and comprehensive vision, with industry-leading understanding of the needs of application development, deployment and management.
6CONFIDENTIAL © F5 Networks, Inc.
Gartner Magic Quadrant for SSL VPN
"This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from F5."The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose
8CONFIDENTIAL © F5 Networks, Inc.
Question 2: What is F5 best known for:
a) iRules
b) Load Balancer
c) Security
d) Mobile
9CONFIDENTIAL © F5 Networks, Inc.
“Stovepipes” of Technology
VDI / BYOD
SSL VPNCAC / PIVSSO
Application Security
Web Application
Firewall
Global Load
BalancingDNSSEC
Load Balancing
IP v66:4|4:6
ApplicationAccelerationWAN
OptimizationSOA
Customization
Solutions
Traffic Management Operating System
Application Delivery Services
AccessSecurity Availability
iRulesiControl
10CONFIDENTIAL © F5 Networks, Inc.
Question 3: F5 supports the following VDI :
a) VMware
b) Citrix
c) Microsoft
d) All of the Above
11CONFIDENTIAL © F5 Networks, Inc.
Network
Session
Application
Web application
Physical
Client / Server
L4 Firewall: Full stateful policy enforcement and TCP DDoS mitigation
SSL inspection and SSL DDoS mitigation
HTTP proxy, HTTP DDoS and application security
Application health monitoring and performance anomaly detection
Network
Session
Application
Web application
Physical
Client / Server
Full Proxy Security
High-performance HW
iRules
iControl API
F5’s Approach
• TMOS traffic plug-ins• High-performance networking microkernel• Powerful application protocol support
• iControl—External monitoring and control• iRules—Network programming language
IPv4
/IPv
6
SSL
TCP
HTT
P
Optional modules plug in for all F5 products and solutions
APM
Fire
wal
l
…
Traffic management microkernel
Proxy
Clientside
Serverside SS
L
TCP
One
Conn
ect
HTT
P
12CONFIDENTIAL © F5 Networks, Inc.
Question 4: What type’s of DDoS attacks does F5 protect against?
a) Simple Network Attacks: SYN Floods, Connection Floods, UDP & CMP Floods
b) DNS Attacks: UDP Floods, NXDOMAIN Query Floods
c) HTTP Floods: Recursive-gets, Slowloris, SSL Attacks, SSL Renegotiation
d) All of the Above
13CONFIDENTIAL © F5 Networks, Inc.
High Value Customer Support -Slash Response Times
Help needed
DevCentralrequest
One hour laterF5 validates and posts fix
One week laterApache releasesfix
One week later… testing and rollout still needs to take place.
Extensibility delivers protection sooner
One hour later… the customer deployed and validated the fix
A user asks for help to avoid an exploit on Apache
14CONFIDENTIAL © F5 Networks, Inc.
Question 5: DevCentral has approximately how many members:
a) 10,000 users
b) 50,000 users
c) What’s DevCentral?
d) 110,000+ users
15CONFIDENTIAL © F5 Networks, Inc.
Small Business Quote- Tapestry Technologies
"As a small business providing IT services to the federal government it is difficult to differentiate in a highly competitive marketplace. Through partnering with F5, we have been able to learn F5 products, pair that with our knowledge of the customer's environment and bring innovative solutions to our customers. Partnering with F5 has helped us set ourselves apart and brought huge benefits to Tapestry Technologies."
16CONFIDENTIAL © F5 Networks, Inc.
F5 Networks and University of Phoenix Collaborate to Create Application Delivery Networking Certificate Program
• “One of the challenges is to find individuals with the appropriate skill set and, more importantly, retaining the people with these difficult-to-find skills, as there is a recognized shortage and many with this skill will gravitate to the vendor community,” wrote Mark Fabbi and Joe Skorupa of Gartner. “The role played by the application delivery architect demands strong people skills and broad technical skills.”
• http://www.f5.com/about/news/press/2013/20130709/
17CONFIDENTIAL © F5 Networks, Inc.
F5 GUARDIAN Professional Services Program• Designed to help UNITY partners that have established consulting
and professional services practices achieve increased sales, higher margins and more strategic customer relationships.
18CONFIDENTIAL © F5 Networks, Inc.
Benefits of the Guardian Program• 20% off F5 Authorized Training Centers’ course list price
• Early access to F5 product technical training including a hosted lab environment.
• Free F5 Professional Certification Program beta exam vouchers
• Invitation to participate in the Professional Services technical forum
• On-request access to F5 Professional Services assistance
• Visibility on the F5 corporate website
• Opportunity to participate in joint media outreach
• Access to select research on best practices for Professional Services teams
19CONFIDENTIAL © F5 Networks, Inc.
Where we can use your help?• Consider partnering with F5
• Engage Technical Architects, Security Architects, Enterprise Architects, Virtualization, SharePoint, Web Apps, etc….
• Get Smart on BIG-IP • Free LTM Training• Lunch and Learns• Proof of Concepts• DevCentral
• Certified personnel supporting our platform, including Traffic Management, Access Policy, Web Application Firewall, and more.
20CONFIDENTIAL © F5 Networks, Inc.
John Manning(703) 898-4135
j.manning@f5.com
Visit us at the CDCA C5ISR SUMMIT November 12-15, 2013
top related