DDoS History
DDoS Protection
OnSite & Safe
Application Access
Products
100
This method of DDoS protection uses both cloud-based security and on-premise solutions.
What is the Hybrid Approach to DDoS Security?
100
This term applies to Cloud, Network, and Application areas of your network as "SPC".
What is Strategic Points of Control.
100
This public cloud service helps on-premise solutions handle large DDoS attacks.
What is Cloud Scrubbing Service?
100
This is known as "VPN access via a web browser"
What is SSL VPN?
100
This product ensures Web Applications are secure from layer 4 to 7 as a reverse proxy.
What is the Application Security Module (ASM)? (also known as: Web Application Firewall (WAF).
200
This is an impact of DDoS that can make users distrust educational and government agencies with the handling of their data.
What is loss of reputation?
200
F5 uses this term to apply to a type of data center components to "clean up" security threats and provide "clean traffic" to your site. Rub-a-Dub-Dub!
What is a Scrubbin Center?
200
This strategic point of control is in between the public cloud and the back-end application servers.
What is Network?
200
This method of authentication is commonly used with cloud apps such as Salesforce, Office365, and external educational applications like Blackboard and Research databases.
What is SAML assertion?
200
This allows security administrators to apply network ACLs and other perimeter controls to traffic entering and leaving the network.
What is Advanced Firewall Manager (AFM)? (also known as: Network Firewall)
300
The second word of this phrase rhymes with "sectors" and sounds like hackers are planning a major offensive battle.
What are Attack Vectors?
300
Some say every cloud has one of these, which explains how F5 got the name for their cloud security layer.
What is a silver lining (F5 Silverline)?
300
This flowchart-style interface allows you to quickly build powerful rulesets in the APM system.
What is Visual Policy Editor (VPE)?
300
This device load balances local traffic on a familiar F5 product suite.
What is a BIG-IP Local Traffic Manager (LTM)? aka: Load Balancer or Application Delivery Controller (ADC)
400
Together with Application and SSL attacks, these two types of DDoS attacks are becoming more frequent and changing in intensity.
What are DNS and Network attacks?
400
This term applies to a cloud solution that stops bad traffic before it gets to your network and operates 24/7.
What is Always On?
400
This is what information from scanners, anonymous proxies, anonymous requests, botnets and attackers is known as.
What is "Thread Intelligence Feed"?
400
This module/device allows load balancing across different geographic locations and protect DNS.
What is BIG-IP Global Traffic Manager (GTM)? (aka: GSLB)
500
This is a term for breaking into a computer system or network, for a politically or socially motivated purpose.
What is hacktivism?
500
This 3-letter acronym for tunneling clean traffic to your site from a cloud security solution, is a GREAT method indeed.
What is GRE?
500
This is a great way to provide a customized and flexible way to control DDoS threats via a well known programming language.
What is an iRule?
500
With all the mobile devices, tablets, and other IoT devices, this property of APM comes in quite handy.
What is scalability?
500
This product provides a scalable, secure, and consolidated method for controlling secure access to on-premise applications including web applications, RDP and other VDI apps, external apps using SAML assertion, and SSL VPN connectivity to the private network.
What is Access Policy Manager (APM)? (aka: SSL VPN)
M
e
n
u