F5 Networks Acquires Defense.Net, Inc.F5 Networks Acquires Defense.Net, Inc.
Extends F5’s security offerings with a highly scalable cloud-based DDoS mitigation service, engineered to absorb the largest attacks.
May 23, 2014
SEATTLE – F5 Networks (NASDAQ: FFIV) announced today that it has acquired Defense.Net, Inc. a privately-held provider of cloud-based security services for protecting data centers and Internet applications from distributed denial-of-service (DDoS) attacks. The advanced technologies and operational experience shared between the two companies will expand F5’s portfolio of security solutions for defense against Internet-based DDoS attacks on networks, data centers, and applications. Defense.Net’s high-capacity cloud service is complementary to F5’s existing on-premise DDoS Protection capabilities. The combination provides customers with the most comprehensive hybrid DDoS solution, engineered to absorb the full threat spectrum of DDoS attacks.
Designed by DDoS industry pioneers, Defense.Net’s service is supported by an advanced, high-throughput infrastructure to defend organizations against the new generation of massive and sophisticated DDoS attacks. The Defense.Net network supports multiple protocols and provides ground-breaking features for remediation and control to safeguard customers from unforeseen threat vectors, while maintaining application performance.
The terms of the acquisition were not disclosed. The acquisition is not expected to have a material impact on F5’s operating results.
“F5’s objective is to help protect customers from ever-changing security threats before they impact their businesses,” said Manny Rivelo, EVP of Strategic Solutions at F5. “Customers ultimately want a unified solution that seamlessly blocks DDoS attacks at the appropriate network location for the type of threat posed. The appeal of a hybrid F5 solution is that it combines the best of on-premises and cloud-based protection. The highly respected team of security experts from Defense.Net is a welcomed addition to F5.”
“F5’s DDoS product engineering shows a comparable focus on scale and performance to how Defense.Net has built its mitigation capability in the cloud,” said Barrett Lyon, Founder and CTO of Defense.Net. “Customers of all sizes will be able to ensure that business-critical applications and networks are protected and available under the most demanding conditions regardless of the volume, type, or source of DDoS attack. Wherever it makes the most sense to stop an attack, F5 will provide the customer with the right defense.”
“Sophisticated DDoS attacks combine high volume traffic-clogging with stealthy low and slow application-targeted techniques,” said John Grady, Research Manager for Security Products at IDC. “These hybrid attacks will increasingly cause serious disruption for organizations. A defense-in-depth strategy for DDoS takes a combined approach that incorporates on-premises appliances for detecting and mitigating mid-volume, SSL, or application-targeted attacks, while a cloud scrubbing facility stops the volumetric attacks that are dozens of gigabits in bandwidth from even reaching the enterprise network.”
F5 (NASDAQ: FFIV) provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends. For more information, go to f5.com.
F5, F5 Networks, and Defense.Net are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries.
# # #
This press release may contain forward looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report
2021 Banking and Financial Services Industry Cyber Threat Landscape Report
Supply Chain Cyber Risk Management Whitepaper