Presentation is loading. Please wait.

Presentation is loading. Please wait.

CDCA's Small Business and Industry Outreach Initiative "SBIOI 29"

Similar presentations


Presentation on theme: "CDCA's Small Business and Industry Outreach Initiative "SBIOI 29""— Presentation transcript:

1 CDCA's Small Business and Industry Outreach Initiative "SBIOI 29"
Quiz throughout F5 Platform Capability Delivery Mobility Life Cycle Costs John Manning, Federal Account Manager July 18, 2013

2 I’d like to start by adding an award to the table who participates and correctly answers the most questions... The most my hands, I have 8 $10 Starbucks Gift Cards…. The table who participates the most, will be victor… I’ll rely on two judges from the CDCA to determine the winning table…

3 Question 1: The name F5 originated from:
It’s the 5th letter in the alphabet The computer function F5 key, to fire up a display The movie Twister

4 Company Snapshot Leading provider of Application Delivery Networking products that optimize the security, performance & availability of network applications, servers and storage systems Founded 1996 / Public 1999 Approx. 3,030 employees FY11 Revenue: $1.2B FY12 Revenue: $1.4B Revenue

5 Gartner Magic Quadrant for ADC
F5's internal knowledgebase and understanding of diverse and complex application environments makes it the top choice for complex environments. F5 has a broad and comprehensive vision, with industry-leading understanding of the needs of application development, deployment and management. F5 is a strong market leader, with a very large share and a strong financial base. VMware's decision to choose F5 as its first ADC partner to integrate vCenter demonstrates the potential leverage enterprises can gain by selecting F5 as a strategic supplier. Consider F5 for all ADC requirements, particularly the most demanding, where integration with application and virtualization environments is critical "This Magic Quadrant graphic was published by Gartner, Inshould be evaluated in the context of the entire report. The Gartner report is available upon request from F5."The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose c. as part of a larger research note and

6 Gartner Magic Quadrant for SSL VPN
F5 has offered SSL VPNs since F5's main distinguishing characteristics are high performance, reliable gateways and carrier-class acceleration. F5 delivers steadily on road map milestones, including its Access Policy Manager (APM), Big-IP Edge Gateway and support for mobile devices. Combined with good feedback, breadth of deployments and seat penetration exceeding 1 million for the past year, F5 regains its Leader ranking. Buyer preferences include hosted virtual desktop support, business continuity and smartphone support. Big-IP earns a certification of CC EAL2 and up; FIPS Level 1 certification on all models can be provided by optional hardware. Strengths Revenue for F5's SSL VPN LOB grew a solid 28% in 2010, following a strong run of 35% growth during the economic slowdown of 2008 and Overall, the company grew more than 40% after a flat performance in the study period of the previous Magic Quadrant report. F5's ability to sell a general-purpose remote-access solution, a strong understanding of Web application deployments within the enterprise, and the fact that it is a leading player in the provision of application delivery services account for a healthy ranking for vision. F5 is a strong player in related markets for load balancing, Web acceleration, WAN optimization, dynamic DNS load balancing, application-level failover and Web application firewall. Entry-level pricing is attractive. Top-end performance reaches 60,000 user sessions in a single appliance, supporting throughput speeds of 10 Gbps and up. F5's Visual Policy Editor and iRules scripting language continue to set the bar for ease of use and user-driven customization. Visual support has been expanded to iApps for application delivery. Native agent support was added in 2011 for Apple and Google phones and tablets. Cautions F5 receives a third-place mention as a competitive threat by its peers, which is indicative of selling into different buying centers, on the positive side, but of missing opportunities to compete, on the negative side. The competitive threat question is indicative of the ability of a vendor to be disruptive in a market. F5 faces an uphill contest with vendors that offer both SSL and IPsec, and should reconsider whether to build or acquire client-based IPsec support, particularly to meet a wider set of needs on mobile devices. According to Gartner, “Leaders demonstrate balanced progress and effort on all execution and vision categories. Their actions raise the competitive bar for all products in the market, and they can change the course of the industry. To remain in the Leaders quadrant, these vendors must excel in mobile access and protection and dominate in sales. A leading vendor is not a default choice for every buyer, and clients are warned not to assume that they should buy only from the Leaders quadrant. To stay on the right side of the chart, Leaders (and Visionaries) must follow courses that are competitively disruptive, and not only are ahead of the curve, but also offer features that remove significant roadblocks to vendor sales and buyer implementations. One example of a competitively disruptive activity might include delivering a superior smartphone client in terms of capability, user experience, and user adoption that could significantly stimulate new smartphone VPN deployments.”1 "This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from F5."The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose

7

8 Question 2: What is F5 best known for:
iRules Load Balancer Security Mobile

9 “Stovepipes” of Technology
Customization Solutions Traffic Management Operating System Application Delivery Services Access Security Availability iControl iRules “Stovepipes” of Technology Global Load Balancing DNSSEC SSL VPN Load Balancing Application Security Web Application Firewall CAC / PIV SSO Application Acceleration SOA VDI / BYOD IP v6 6:4|4:6 IT’s about the elimination of stovepipes of technology, and building an flexible IT architecture to support the Dept of Defense Benefits of a Consolidated Platform Reduced infrastructure = LOWER COST Reduced personnel / SMEs = LOWER COST Standardization = LOWER COST Less power (multiple devices) = LOWER COST SSL Offload = LOWER COST Less training = LOWER COST Lower maintenance fees = LOWER COST Faster delivery of apps = Happier Users Context aware = MORE SECURE (W,W,W,W,W, H) . WAN Optimization

10 Question 3: F5 supports the following VDI :
VMware Citrix Microsoft All of the Above

11 Full Proxy Security F5’s Approach Firewall APM … Network Session
Application Web application Physical Client / Server L4 Firewall: Full stateful policy enforcement and TCP DDoS mitigation SSL inspection and SSL DDoS mitigation HTTP proxy, HTTP DDoS and application security Application health monitoring and performance anomaly detection F5’s Approach Optional modules plug in for all F5 products and solutions Firewall APM Traffic management microkernel IPv4/IPv6 TCP HTTP SSL Proxy HTTP SSL OneConnect TCP Client side Server side F5 Mitigation Technologies: Application: BIG-IP ASM: Positive and negative policy reinforcement, iRules, full proxy for HTTP, server performance anomaly detection Session: BIG-IP LTM and GTM: high scale performance, DNS Express, SSL termination, iRules, SSL renegotiation validation Network: BIG-IP LTM: SynCheck, default-deny posture, high-capacity connection table, full proxy traffic visibility, rate-limiting, strict TCP forwarding. Network layer bullets: L4 Stateful firewall – including TCP checksum checks, fragmentation and reassembly DDoS mitigation Session layer: SSL inspection SSL DDoS attacks Application Layer: OWASP top 10 Application content scrubbing (S -> C) iRules High-performance HW iControl API TMOS traffic plug-ins iControl—External monitoring and control High-performance networking microkernel iRules—Network programming language Powerful application protocol support

12 Question 4: What type’s of DDoS attacks does F5 protect against?
Simple Network Attacks: SYN Floods, Connection Floods, UDP & CMP Floods DNS Attacks: UDP Floods, NXDOMAIN Query Floods HTTP Floods: Recursive-gets, Slowloris, SSL Attacks, SSL Renegotiation All of the Above Answer is all of the above.  All platforms have DDoS built in at the core, with the ability to scale with the heaviest of loads.  3900 = 6 Million CC, = 25 Million CC, Viprion = 192 Million CC

13 High Value Customer Support -Slash Response Times
Extensibility delivers protection sooner Help needed One hour later One week later DevCentral request F5 validates and posts fix Apache releases fix A user asks for help to avoid an exploit on Apache One hour later… the customer deployed and validated the fix One week later… testing and rollout still needs to take place. In this case, the target is Apache and the “vulnerability” is in the way multiple ranges are handled by the Apache HTTPD server. The RANGE HTTP header is used to request one or more sub-ranges of the response, instead of the entire response entity. Ranges are sometimes used by thin clients (an example given was an eReader) that are memory constrained and may want to display just portions of the web page.  Generally speaking, multiple byte ranges are not used very often.

14 Question 5: DevCentral has approximately how many members:
10,000 users 50,000 users What’s DevCentral? 110,000+ users

15 Small Business Quote- Tapestry Technologies
 "As a small business providing IT services to the federal government it is difficult to differentiate in a highly competitive marketplace. Through partnering with F5, we have been able to learn F5 products, pair that with our knowledge of the customer's environment and bring innovative solutions to our customers. Partnering with F5 has helped us set ourselves apart and brought huge benefits to Tapestry Technologies."  Sticky solution Contract Performance Reseller System Integrator Angie Fogelsonger, Vice President, Business Development 

16 F5 Networks and University of Phoenix Collaborate to Create Application Delivery Networking Certificate Program “One of the challenges is to find individuals with the appropriate skill set and, more importantly, retaining the people with these difficult-to-find skills, as there is a recognized shortage and many with this skill will gravitate to the vendor community,” wrote Mark Fabbi and Joe Skorupa of Gartner. “The role played by the application delivery architect demands strong people skills and broad technical skills.” Press Release  |  July 2013 SEATTLE—Today, F5 Networks, Inc. (NASDAQ: FFIV), the global leader in Application Delivery Networking (ADN), and University of Phoenix announced the pooling of resources to develop an ADN Certificate Program (noncredit). University of Phoenix will be offering five new courses that provide the knowledge that is foundational to F5 certifications. The coursework is software and hardware-agnostic, which allows students to develop transferrable skills in ADN. The program also features a virtual learning and lab environment to allow demonstration and practice of concepts on F5®products, including F5 BIG-IP Local Traffic Manager™ and BIG-IP® Local Traffic Manager Virtual Edition. ADN is an approach and a suite of technologies that comprises application security, application acceleration and network availability. ADN ensures that applications are always secure, fast, and available across any network. The program’s curriculum focuses on layer 4–7, while emphasizing the foundational knowledge required to design, deploy, and manage solutions in complex ADN environments. The program is designed for individuals focused on deploying and maintaining networking solutions.

17 F5 GUARDIAN Professional Services Program
Designed to help UNITY partners that have established consulting and professional services practices achieve increased sales, higher margins and more strategic customer relationships. BENEFITS  20% off F5 Authorized Training Centers’ course list price  Early access to F5 product technical training including a hosted lab environment.  Free F5 Professional Certification Program beta exam vouchers  Invitation to participate in the Professional Services technical forum  Support in the development of new Professional Services offerings  On-request access to F5 Professional Services assistance  Visibility on the F5 corporate website  Opportunity to participate in joint media outreach  Incentives to develop joint case studies  Access to select research on best practices for Professional Services teams As a GUARDIAN Professional Services Program member not only will you receive education, consulting services sales and delivery enablement benefits; customers can readily identify your organization as one with the deep F5 product knowledge and consulting skills necessary to successfully architect, implement, maintain and optimize F5 technologies.

18 Benefits of the Guardian Program
20% off F5 Authorized Training Centers’ course list price Early access to F5 product technical training including a hosted lab environment. Free F5 Professional Certification Program beta exam vouchers Invitation to participate in the Professional Services technical forum On-request access to F5 Professional Services assistance Visibility on the F5 corporate website Opportunity to participate in joint media outreach Access to select research on best practices for Professional Services teams As a GUARDIAN Professional Services Program member not only will you receive education, consulting services sales and delivery enablement benefits; customers can readily identify your organization as one with the deep F5 product knowledge and consulting skills necessary to successfully architect, implement, maintain and optimize F5 technologies.

19 Where we can use your help?
Consider partnering with F5 Engage Technical Architects, Security Architects, Enterprise Architects, Virtualization, SharePoint, Web Apps, etc…. Get Smart on BIG-IP Free LTM Training Lunch and Learns Proof of Concepts DevCentral Certified personnel supporting our platform, including Traffic Management, Access Policy, Web Application Firewall, and more.

20 John Manning (703) 898-4135 j.manning@f5.com
Visit us at the CDCA C5ISR SUMMIT November 12-15, 2013


Download ppt "CDCA's Small Business and Industry Outreach Initiative "SBIOI 29""

Similar presentations


Ads by Google