CONFIDENTIAL CDCA'S SMALL BUSINESS AND INDUSTRY OUTREACH INITIATIVE "SBIOI 29" John Manning, Federal...

20
CONFIDENTIAL CDCA'S SMALL BUSINESS AND INDUSTRY OUTREACH INITIATIVE "SBIOI 29" John Manning, Federal Account Manager July 18, 2013

Transcript of CONFIDENTIAL CDCA'S SMALL BUSINESS AND INDUSTRY OUTREACH INITIATIVE "SBIOI 29" John Manning, Federal...

CONFIDENTIAL

CDCA'S SMALL BUSINESS AND INDUSTRY OUTREACH INITIATIVE

"SBIOI 29"

John Manning, Federal Account Manager

July 18, 2013

2CONFIDENTIAL © F5 Networks, Inc.

3CONFIDENTIAL © F5 Networks, Inc.

Question 1: The name F5 originated from:

a) It’s the 5th letter in the alphabet

b) The computer function F5 key, to fire up a display

c) The movie Twister

4CONFIDENTIAL © F5 Networks, Inc.

Company Snapshot• Leading provider of Application

Delivery Networking products that optimize the security, performance & availability of network applications, servers and storage systems

• Founded 1996 / Public 1999

• Approx. 3,030 employees

• FY11 Revenue: $1.2B

• FY12 Revenue: $1.4B0

50

100

150

200

250

300

350

400

4Q

10

1Q

11

2Q

11

3Q

11

4Q

11

1Q

12

2Q

12

3Q

12

4Q

12

$ M

illi

on

s

Service

Product

Revenue

5CONFIDENTIAL © F5 Networks, Inc.

Gartner Magic Quadrant for ADC

"This Magic Quadrant graphic was published by Gartner, Inshould be evaluated in the context of the entire report. The Gartner report is available upon request from F5."The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposec. as part of a larger research note and

• F5's internal knowledgebase and understanding of diverse and complex application environments makes it the top choice for complex environments.

• F5 has a broad and comprehensive vision, with industry-leading understanding of the needs of application development, deployment and management.

6CONFIDENTIAL © F5 Networks, Inc.

Gartner Magic Quadrant for SSL VPN

"This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from F5."The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose

7CONFIDENTIAL © F5 Networks, Inc.

8CONFIDENTIAL © F5 Networks, Inc.

Question 2: What is F5 best known for:

a) iRules

b) Load Balancer

c) Security

d) Mobile

9CONFIDENTIAL © F5 Networks, Inc.

“Stovepipes” of Technology

VDI / BYOD

SSL VPNCAC / PIVSSO

Application Security

Web Application

Firewall

Global Load

BalancingDNSSEC

Load Balancing

IP v66:4|4:6

ApplicationAccelerationWAN

OptimizationSOA

Customization

Solutions

Traffic Management Operating System

Application Delivery Services

AccessSecurity Availability

iRulesiControl

10CONFIDENTIAL © F5 Networks, Inc.

Question 3: F5 supports the following VDI :

a) VMware

b) Citrix

c) Microsoft

d) All of the Above

11CONFIDENTIAL © F5 Networks, Inc.

Network

Session

Application

Web application

Physical

Client / Server

L4 Firewall: Full stateful policy enforcement and TCP DDoS mitigation

SSL inspection and SSL DDoS mitigation

HTTP proxy, HTTP DDoS and application security

Application health monitoring and performance anomaly detection

Network

Session

Application

Web application

Physical

Client / Server

Full Proxy Security

High-performance HW

iRules

iControl API

F5’s Approach

• TMOS traffic plug-ins• High-performance networking microkernel• Powerful application protocol support

• iControl—External monitoring and control• iRules—Network programming language

IPv4

/IPv

6

SSL

TCP

HTT

P

Optional modules plug in for all F5 products and solutions

APM

Fire

wal

l

Traffic management microkernel

Proxy

Clientside

Serverside SS

L

TCP

One

Conn

ect

HTT

P

12CONFIDENTIAL © F5 Networks, Inc.

Question 4: What type’s of DDoS attacks does F5 protect against?

a) Simple Network Attacks: SYN Floods, Connection Floods, UDP & CMP Floods

b) DNS Attacks: UDP Floods, NXDOMAIN Query Floods

c) HTTP Floods: Recursive-gets, Slowloris, SSL Attacks, SSL Renegotiation

d) All of the Above

13CONFIDENTIAL © F5 Networks, Inc.

High Value Customer Support -Slash Response Times

Help needed

DevCentralrequest

One hour laterF5 validates and posts fix

One week laterApache releasesfix

One week later… testing and rollout still needs to take place.

Extensibility delivers protection sooner

One hour later… the customer deployed and validated the fix

A user asks for help to avoid an exploit on Apache

14CONFIDENTIAL © F5 Networks, Inc.

Question 5: DevCentral has approximately how many members:

a) 10,000 users

b) 50,000 users

c) What’s DevCentral?

d) 110,000+ users

15CONFIDENTIAL © F5 Networks, Inc.

Small Business Quote- Tapestry Technologies

"As a small business providing IT services to the federal government it is difficult to differentiate in a highly competitive marketplace. Through partnering with F5, we have been able to learn F5 products, pair that with our knowledge of the customer's environment and bring innovative solutions to our customers. Partnering with F5 has helped us set ourselves apart and brought huge benefits to Tapestry Technologies."

16CONFIDENTIAL © F5 Networks, Inc.

F5 Networks and University of Phoenix Collaborate to Create Application Delivery Networking Certificate Program

• “One of the challenges is to find individuals with the appropriate skill set and, more importantly, retaining the people with these difficult-to-find skills, as there is a recognized shortage and many with this skill will gravitate to the vendor community,” wrote Mark Fabbi and Joe Skorupa of Gartner. “The role played by the application delivery architect demands strong people skills and broad technical skills.”

• http://www.f5.com/about/news/press/2013/20130709/

17CONFIDENTIAL © F5 Networks, Inc.

F5 GUARDIAN Professional Services Program• Designed to help UNITY partners that have established consulting

and professional services practices achieve increased sales, higher margins and more strategic customer relationships.

18CONFIDENTIAL © F5 Networks, Inc.

Benefits of the Guardian Program• 20% off F5 Authorized Training Centers’ course list price

• Early access to F5 product technical training including a hosted lab environment.

• Free F5 Professional Certification Program beta exam vouchers

• Invitation to participate in the Professional Services technical forum

• On-request access to F5 Professional Services assistance

• Visibility on the F5 corporate website

• Opportunity to participate in joint media outreach

• Access to select research on best practices for Professional Services teams

19CONFIDENTIAL © F5 Networks, Inc.

Where we can use your help?• Consider partnering with F5

• Engage Technical Architects, Security Architects, Enterprise Architects, Virtualization, SharePoint, Web Apps, etc….

• Get Smart on BIG-IP • Free LTM Training• Lunch and Learns• Proof of Concepts• DevCentral

• Certified personnel supporting our platform, including Traffic Management, Access Policy, Web Application Firewall, and more.

20CONFIDENTIAL © F5 Networks, Inc.

John Manning(703) 898-4135

[email protected]

Visit us at the CDCA C5ISR SUMMIT November 12-15, 2013