AWS now integrates F5 distributed cloud bot defense to help enterprises effectively deal with complex robot attacks

AWS now integrates F5 distributed cloud bot defense to help enterprises effectively deal with complex robot attacks

F5 (NASDAQ: FFIV) today announced that F5 Distributed Cloud Bot Defense is now integrated with Amazon CloudFront, enabling AWS customers to secure their business with F5’s AI-driven, highly effective bot defense service through an easy-to-deploy connector .

Malicious bot attacks are everywhere these days. Many websites, login pages, and apps that consumers frequently use become unusually slow when they are attacked by malicious attacks. These attacks can have a very serious impact on customers and their organizations, and cause serious financial losses to businesses. But when trying to stop these attacks, it is easy for bots to update and resume attacks. Kamal Kalra, director of operations at e-commerce company VegNonVeg, said: "The problem of bot attacks continues to exist, and every time we have countermeasures, they will produce new variants that make us helpless. After applying F5, we can constantly make adjustments based on the changes in bot attack patterns, ensuring that we are always one step ahead to detect malicious attacks and prevent accidents." The company is currently using F5 Distributed Cloud Bot Defense on AWS to protect the company's business from bot attacks.

Amazon CloudFront customers can now use the connector to integrate with F5’s Distributed Cloud Bot Defense pre-installed to further protect their application security with the industry’s leading accurate robot detection solution. With F5’s rich signal analysis, artificial intelligence technology, and outstanding expert knowledge and experience, it can help customers distinguish between valid and ideal transactions and fake and malicious transactions, thereby effectively mitigating the threats posed by robots.

“As enterprises continue to deploy critical workloads and business processes across an expanding cloud environment, they need security solutions that are better integrated into their technology stack and that leverage more intelligent and automated controls to protect their growing attack surface,” said Haiyan Song, executive vice president and general manager of F5’s Security and Distributed Cloud Products Division. “This is exactly what F5 Distributed Cloud Bot Defense brings to AWS customers.”

F5 Distributed Cloud Bot Defense provides critical security capabilities for Amazon CloudFront that prevent malicious attacks such as account takeover (ATO), credential stuffing, inventory locking, and gift card cracking, blocking destructive automated robot attacks while allowing access to benign web robots that help drive customer business growth.

As a result, customers can improve the security of their applications without adding friction. In addition, customers can limit fraud through the creation of fake accounts or the abuse of existing accounts. The leading security capabilities provided by F5 can not only help customers better protect their brands, but also provide end users with a secure, seamless, and reliable digital experience while improving availability and application performance. Kalra said: "We knew that bots would generate traffic, but F5 helped us understand exactly how much traffic came from bots and how it affected us. By mitigating the threat from bots, we can protect our customers from the impact and significantly reduce infrastructure costs."

“AWS is customer-centric, so it’s critical that we provide them with secure, reliable, high-performance, and scalable solutions,” said Nishit Sawhney, Director of Product Management for Amazon CloudFront at AWS. “Independent software vendors (ISVs) like F5 offer enhanced security services in areas like bot management, and when these services are integrated with Amazon CloudFront, we can provide our customers with an even better multi-layered security solution.”


<<:  Basic concepts and development prospects of Bluetooth Mesh protocol

>>:  A two-way communication without IP confirmation via Udp

Recommend

Paving the way to a secure and automated multi-cloud with SD-WAN

Enterprises around the world are rapidly transfor...

8 ways to make Android a powerful productivity tool

【51CTO.com Quick Translation】 According to a surv...

Report: Global mobile broadband coverage reaches 95%

The majority of the world’s population – 95% – is...

Approaches to Solving Multiradio Hardware Design Challenges

The combination of multi-radio and multi-protocol...

5G bidding is finalized, and competition is changing again

[[417538]] 2021 is the third year of 5G commercia...

Imitate Spring to implement a class management container

Overview The original intention of the project wa...

What exactly is UWB technology?

This article is reprinted from the WeChat public ...

Phicomm N1 (Tiantian Chain) flash YYF voice version

More than 2 years ago, I recorded the process of ...

What is Wavelength Division Multiplexing (WDM)? A Beginner's Guide to WDM

Wavelength Division Multiplexing (WDM) has gained...

Seven of the hottest new IT jobs

In the era of cloud computing, big data, the Inte...

This year's 5G mobile phones must have these features!

[[387087]] This article is reprinted from the WeC...

Blockchain cross-domain security solution

1. Evolution of blockchain development Looking ba...