AWS now integrates F5 distributed cloud bot defense to help enterprises effectively deal with complex robot attacks

AWS now integrates F5 distributed cloud bot defense to help enterprises effectively deal with complex robot attacks

F5 (NASDAQ: FFIV) today announced that F5 Distributed Cloud Bot Defense is now integrated with Amazon CloudFront, enabling AWS customers to secure their business with F5’s AI-driven, highly effective bot defense service through an easy-to-deploy connector .

Malicious bot attacks are everywhere these days. Many websites, login pages, and apps that consumers frequently use become unusually slow when they are attacked by malicious attacks. These attacks can have a very serious impact on customers and their organizations, and cause serious financial losses to businesses. But when trying to stop these attacks, it is easy for bots to update and resume attacks. Kamal Kalra, director of operations at e-commerce company VegNonVeg, said: "The problem of bot attacks continues to exist, and every time we have countermeasures, they will produce new variants that make us helpless. After applying F5, we can constantly make adjustments based on the changes in bot attack patterns, ensuring that we are always one step ahead to detect malicious attacks and prevent accidents." The company is currently using F5 Distributed Cloud Bot Defense on AWS to protect the company's business from bot attacks.

Amazon CloudFront customers can now use the connector to integrate with F5’s Distributed Cloud Bot Defense pre-installed to further protect their application security with the industry’s leading accurate robot detection solution. With F5’s rich signal analysis, artificial intelligence technology, and outstanding expert knowledge and experience, it can help customers distinguish between valid and ideal transactions and fake and malicious transactions, thereby effectively mitigating the threats posed by robots.

“As enterprises continue to deploy critical workloads and business processes across an expanding cloud environment, they need security solutions that are better integrated into their technology stack and that leverage more intelligent and automated controls to protect their growing attack surface,” said Haiyan Song, executive vice president and general manager of F5’s Security and Distributed Cloud Products Division. “This is exactly what F5 Distributed Cloud Bot Defense brings to AWS customers.”

F5 Distributed Cloud Bot Defense provides critical security capabilities for Amazon CloudFront that prevent malicious attacks such as account takeover (ATO), credential stuffing, inventory locking, and gift card cracking, blocking destructive automated robot attacks while allowing access to benign web robots that help drive customer business growth.

As a result, customers can improve the security of their applications without adding friction. In addition, customers can limit fraud through the creation of fake accounts or the abuse of existing accounts. The leading security capabilities provided by F5 can not only help customers better protect their brands, but also provide end users with a secure, seamless, and reliable digital experience while improving availability and application performance. Kalra said: "We knew that bots would generate traffic, but F5 helped us understand exactly how much traffic came from bots and how it affected us. By mitigating the threat from bots, we can protect our customers from the impact and significantly reduce infrastructure costs."

“AWS is customer-centric, so it’s critical that we provide them with secure, reliable, high-performance, and scalable solutions,” said Nishit Sawhney, Director of Product Management for Amazon CloudFront at AWS. “Independent software vendors (ISVs) like F5 offer enhanced security services in areas like bot management, and when these services are integrated with Amazon CloudFront, we can provide our customers with an even better multi-layered security solution.”


<<:  Basic concepts and development prospects of Bluetooth Mesh protocol

>>:  A two-way communication without IP confirmation via Udp

Recommend

Outstanding Network Virtualization Solutions in 2021

Hardware maintenance has always been a major prob...

I finally figured out the service flow limit issue.

Introduction With the development of microservice...

Protecting corporate intranet data security in just seven steps

In the Internet information age, science and tech...

Internet innovation pales in comparison! Protocols are the future!

Today, the Internet is very prosperous, and mobil...

Building the nervous system of smart cities | Huawei shines at the 19th CHTF

On November 16, the 19th China Hi-Tech Fair (CHTF...

5G commercialization in its third year: a new prosperity

"As of the end of September, the total numbe...

Network | How to design a billion-level API gateway?

The API gateway can be seen as the entrance for t...

What is the process of DNS domain name resolution?

Interviewer: Please tell me what the process of D...

The significance of optimizing the supply chain network design of enterprises

While the concept may seem simple in theory, the ...