F5 Networks Acquires Defense.Net, Inc.
Extends F5’s security offerings with a highly scalable cloud-based DDoS mitigation service, engineered to absorb the largest attacks.
May 23, 2014
PRESS RELEASE
SEATTLE – F5 Networks (NASDAQ: FFIV) announced today that it has acquired Defense.Net, Inc. a privately-held provider of cloud-based security services for protecting data centers and Internet applications from distributed denial-of-service (DDoS) attacks. The advanced technologies and operational experience shared between the two companies will expand F5’s portfolio of security solutions for defense against Internet-based DDoS attacks on networks, data centers, and applications. Defense.Net’s high-capacity cloud service is complementary to F5’s existing on-premise DDoS Protection capabilities. The combination provides customers with the most comprehensive hybrid DDoS solution, engineered to absorb the full threat spectrum of DDoS attacks.
Designed by DDoS industry pioneers, Defense.Net’s service is supported by an advanced, high-throughput infrastructure to defend organizations against the new generation of massive and sophisticated DDoS attacks. The Defense.Net network supports multiple protocols and provides ground-breaking features for remediation and control to safeguard customers from unforeseen threat vectors, while maintaining application performance.
The terms of the acquisition were not disclosed. The acquisition is not expected to have a material impact on F5’s operating results.
Quotes
“F5’s objective is to help protect customers from ever-changing security threats before they impact their businesses,” said Manny Rivelo, EVP of Strategic Solutions at F5. “Customers ultimately want a unified solution that seamlessly blocks DDoS attacks at the appropriate network location for the type of threat posed. The appeal of a hybrid F5 solution is that it combines the best of on-premises and cloud-based protection. The highly respected team of security experts from Defense.Net is a welcomed addition to F5.”
“F5’s DDoS product engineering shows a comparable focus on scale and performance to how Defense.Net has built its mitigation capability in the cloud,” said Barrett Lyon, Founder and CTO of Defense.Net. “Customers of all sizes will be able to ensure that business-critical applications and networks are protected and available under the most demanding conditions regardless of the volume, type, or source of DDoS attack. Wherever it makes the most sense to stop an attack, F5 will provide the customer with the right defense.”
“Sophisticated DDoS attacks combine high volume traffic-clogging with stealthy low and slow application-targeted techniques,” said John Grady, Research Manager for Security Products at IDC. “These hybrid attacks will increasingly cause serious disruption for organizations. A defense-in-depth strategy for DDoS takes a combined approach that incorporates on-premises appliances for detecting and mitigating mid-volume, SSL, or application-targeted attacks, while a cloud scrubbing facility stops the volumetric attacks that are dozens of gigabits in bandwidth from even reaching the enterprise network.”
About F5
F5 (NASDAQ: FFIV) provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends. For more information, go to f5.com.
You can also follow @f5networks on Twitter or visit us on Facebook for more information about F5, its partners, and technologies.
F5, F5 Networks, and Defense.Net are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries.
# # #
This press release may contain forward looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC
You May Also Like
Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024