SaaS. Public Cloud. Co-located SaaS Containers. Cloud

Similar documents
Enabling Public Cloud Interconnect Services F5 Application Connector

ADC im Cloud - Zeitalter

4/4/2018 F5 Government Symposium 2018 AWS and F5 Deep Dive

Deploy F5 Application Delivery and Security Services in Private, Public, and Hybrid IT Cloud Environments

Sichere Applikations- dienste

Cloud, SDN and BIGIQ. Philippe Bogaerts Senior Field Systems Engineer

What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics

NGF0502 AWS Student Slides

O365 Solutions. Three Phase Approach. Page 1 34

F5 Networks in the Software Defined DataCenter Era. Paolo Pambianco System Engineer CSP

Cisco HyperFlex and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

Management and Orchestration with F5 BIG-IQ 4.5. Philippe Bogaerts F5 Networks

Migrating Enterprise Applications to the Cloud Session 672. Leighton L. Nelson

AWS Reference Architecture - CloudGen Firewall Auto Scaling Cluster

How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud

Exam : Implementing Microsoft Azure Infrastructure Solutions

F5 BIG IP on IBM Cloud Solution Architecture

DevOps CICD PopUp. Software Defined Application Delivery Fabric. Frey Khademi. Systems Engineering DACH. Avi Networks

Cloud Connect. Gain highly secure, performance-optimized access to third-party public and private cloud providers

SAS and F5 integration at F5 Networks. Updates for Version 11.6

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud

Best Practice Deployment of F5 App Services in Private Clouds. Henry Tam, Senior Product Marketing Manager John Gruber, Sr. PM Solutions Architect

Best Practices in Securing a Multicloud World

C ibm IBM C Foundations of IBM Cloud Reference Architecture V5 Version 1.0

CHEM-E Process Automation and Information Systems: Applications

Connect and Transform Your Digital Business with IBM

BIG-IP V11.3: PRODUCT UPDATE. David Perodin Field Systems Engineer III

Pulse Secure Application Delivery

Securing Microservices Containerized Security in AWS

Module Day Topic. 1 Definition of Cloud Computing and its Basics

EdgeConnect for Amazon Web Services (AWS)

VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH

Developing Microsoft Azure Solutions (70-532) Syllabus

Extending Enterprise Security to Multicloud and Public Cloud

F5 Synthesis Information Session. April, 2014

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus

DevOps and Continuous Delivery USE CASE

Introduction to Cloud Computing

Data Sheet Gigamon Visibility Platform for AWS

PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS

and public cloud infrastructure, including Amazon Web Services (AWS) and AWS GovCloud, Microsoft Azure and Azure Government Cloud.

AWS Well Architected Framework

VMware Cloud on AWS The Next Generation Hybrid Cloud Architecture

Cloud Computing. Amazon Web Services (AWS)

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Dynamic App Services in Containerized Environments

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

AWS Reference Design Document

CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY

Enroll Now to Take online Course Contact: Demo video By Chandra sir

CLOUD AND AWS TECHNICAL ESSENTIALS PLUS

SAP Security in a Hybrid World. Kiran Kola

Course Outline. Module 1: Microsoft Azure for AWS Experts Course Overview

Splunk & Amazon Web Services

Data Sheet GigaSECURE Cloud

Training on Amazon AWS Cloud Computing. Course Content

A10 HARMONY CONTROLLER

Oracle IaaS, a modern felhő infrastruktúra

ArcGIS Online A Security, Privacy, and Compliance Overview. Andrea Rosso Michael Young

Transit VPC Deployment Using AWS CloudFormation Templates. White Paper

Patching and Updating your VM SUSE Manager. Donald Vosburg, Sales Engineer, SUSE

Securing Microservice Interactions in Openstack and Kubernetes

Cisco Cloud Architecture with Microsoft Cloud Platform Peter Lackey Technical Solutions Architect PSOSPG-1002

Check Point vsec for Microsoft Azure

Introduction to AWS GoldBase. A Solution to Automate Security, Compliance, and Governance in AWS

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

A different approach to Application Security

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Amazon Web Services 101 April 17 th, 2014 Joel Williams Solutions Architect. Amazon.com, Inc. and its affiliates. All rights reserved.

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

Service Insertion with ACI using F5 iworkflow

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway

Citrix Workspace Cloud

Question: 1 Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.)

Future-Proof Your Hardware Investment PRESENTED BY:

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE

Data center interconnect for the enterprise hybrid cloud

The IBM Platform Computing HPC Cloud Service. Solution Overview

PCS Cloud Solutions. Create highly-available, infinitely-scalable applications and APIs

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC)


SteelConnect. The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN

Securing Your Amazon Web Services Virtual Networks

Azure DevOps. Randy Pagels Intelligent Cloud Technical Specialist Great Lakes Region

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

Configuring AWS for Zerto Virtual Replication

Czas na nowe platformy sprzętowe F5! Dlaczego są to najbardziej programowalne urządzenia ADC na rynku

Additional Security Services on AWS

1/10/2011. Topics. What is the Cloud? Cloud Computing

Build an open hybrid cloud and paint it red and blue

Security as Code: The Time is Now. Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS

AWS Agility + Splunk Visibility = Cloud Success. Splunk App for AWS Demo. Laura Ripans, AWS Alliance Manager

VMware Cloud on AWS. A Closer Look. Frank Denneman Senior Staff Architect Cloud Platform BU

#techsummitch

Imperva SecureSphere Appliances

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

Transcription:

SaaS On-prem Private Cloud Public Cloud Co-located SaaS Containers

APP SERVICES ACCESS TLS/SSL DNS NETWORK

WAF LOAD BALANCING DNS ACCESS CONTROL SECURITY POLICIES

F5 Beside the Cloud

Why Get Closer to the Cloud? Enterprise Users Enterprise Apps There s this distance between us Latency: Performance Connectivity: Security Enterprise Location Public Cloud F5 Networks, Inc 9

Existing Solutions Dedicated connection VPN Cloud Dedicated connection Connection Type Example Advantages Disadvantages Dedicated connection VPN connection AWS Direct Connect Azure Express Route Google Cloud Interconnect Oracle Fast Connect AWS Virtual Private Gateway Azure Virtual Network Gateway Private, fast(er) Cheap Cloud Cost: Pay for line and usage, multiple clouds need multiple connections Uses Internet: Latency, reliability, privacy, and congestion may be issues F5 Networks, Inc 10

Interconnection Dedicated connection Interconnection to Cloud Cloud Cloud Cloud Ready Modernize connectivity to multiple clouds at the edge of the network User Experience Shorten distance and lower latency between users and cloud apps Private/Secure Directly connect users, data and clouds bypassing the public internet Lower Cost Economical, less-complex connectivity compared to old network topologies F5 Networks, Inc 11

Interconnection Interconnection to Cloud Dedicated connection Cloud Cloud Identity Federation WAF DDoS SSLi F5 Networks, Inc 12

Use Case Scenarios Identity Federation WAF DDoS SSLi Mitigate risk by providing dynamic, centralized and adaptive access control and cloud federation for all applications anywhere. Protect your apps, and the data behind them, from evasive, targeted attacks with an industryleading WAF offering the highest level of security without impacting performance. Protect your data with a high value, easy to deploy and manage next generation DDoS solution that guards against the most aggressive and targeted DDoS attacks. Gain critical visibility and deeper intelligence to the traffic on your network and in the cloud that many traditional defenses leave exposed. F5 Networks, Inc 13

Control Public Cloud Apps Better and Avoid Cloud Vendor Lock-in Challenges Lack of control over applications and devices Lack of operational flexibility and risk of cloud provider lock-in Gap in IT resource skillsets in public cloud Recommended app delivery services Advanced local/global traffic management SSL offload and intercept App security DDoS, WAF and IAM Available via BYOL with VE and hardware appliances with GBB licensing models Key Benefits Maintain central point of control and visibility Enable flexibility and portability among clouds Reduce security risks with consistent policies Achieve user performance expectations 2017 F5 Networks 25

Only consistent services insertion across cloud providers Users Interconnect Provider AC Public App Delivery Services SSL, Access, and App Security Services AC Public APM AC LTM ASM AC Public Attacker BIG-IP platform AC Public F5 Application Connector (AC) Automatically discover public cloud-hosted apps in AWS Securely integrates all public clouds to Interconnect or DC Simplifies deploying app delivery and security services Consistent policies and configs across public clouds Reduce footprint by obfuscation / key mgmt. Key Benefits Migrate with confidence Preserves app services control Enables cloud freedom, avoiding lock-in Visibility across all apps

Interconnect Provider AC AC BIG-IP AC Consistent App Services Across Clouds Availability SSL DDoS WAF Identity Federation Achieve reliable and optimized applications. Extensible and flexible application services with programmability to manage physical, virtual, and cloud. Gain critical visibility and deeper intelligence to the traffic on your network and in the cloud that many traditional defenses leave exposed Protect your networks with a high value, easy to deploy and manage DDoS solution that guards against aggressive and targeted attacks. Protect your apps, and the data behind them, from evasive, targeted attacks with an industry-leading WAF offering the highest level of security. Mitigate risk by providing dynamic, centralized and adaptive access control and cloud federation for all applications anywhere.

Application Connector Service Center on BIG-IP: Delivered as iappslx package Application Service Management Real-time Logging and Statistics Multi-Path Workload Discovery Health Monitoring Active/Standby HA Support Touchless Recoverability Service API Application Connector Proxy in the Cloud: Delivered as Docker container Secure TLS ECC Encryption AWS Workload Auto Discovery Manual Workload Definition and State Management Touchless Recoverability Service API

Cloud Interconnect Interconnect Provider End Users AC Service Center BIG-IP AC Proxy Public Cloud Automatically discover public cloud-hosted apps Securely integrates Interconnect / DC to public clouds Simplifies deploying interconnect app services Consistent policies and configs across clouds Reduce footprint by obfuscation / key mgmt. Only consistent services insertion across cloud providers

Independent of network configuration - Deals gracefully with overlapping IP space Allows sensitive encryption keys to be stored outside the cloud environment - Can leave serverssl none towards the node and traffic is protected until it gets into the environment Hides original environment entirely from clients - Does not require mapping to public IPs in the CSP - Significantly reduces potential attack surface Keeps BIG-IP configuration automatically notified of changes within the environment User Key Reduced attack surface no visible public IP addressing Encryption Keys stored centrally (not in the cloud instances) Amazon Rackspace Azure AC BIG-IP SoftLayer Amazon AWS AC AC IBM SoftLayer AC Rackspace AC Azure Workload nodes can be auto discovered in AWS by the proxy instance. Manual integration for all clouds.

F5 Application Connector: Four Use Case Examples SSL Protect Your Cloud Apps from Attack Control Cloud Access Improve Public Cloud Encryption Auto-Discover Public Cloud Workloads Maximize Your Protection Investments Consolidate and Automate Access Control Simplify and Centralize SSL Reduce App Sprawl Lift and shift apps with confidence without sacrificing security configurations Insert public cloud access control at cloud interconnect Manage public cloud app encryption at cloud interconnect Auto-search public clouds to reveal app deployments Leverage app protection and extend to public cloud workloads Enable SSO with OAuth, and SAML insertion across clouds Avoids cloud provider lock-in and preserves your control Securely connect to BIG-IP and enable app services insertion Lower your attack surface - no public IP addresses in the cloud All policies managed in one location for all apps Reduce footprint by obfuscation / key mgmt. Deliver approved app services to multiple public clouds

Users Interconnect Provider Or Data Center LTM APM AC BIG-IP Security Services Access IPS, IDS, DLP Control Problem: App sprawl and access decentralized Admin. fatigue on policy for cloud and SaaS apps User password fatigue across multi-cloud apps Need uniform cloud access control services Example (steps for every app): Deploying multi-cloud and SaaS apps Select app and access configs for each app Decentralized app and access changes Separate app sign-in for IT and user across apps VPC Public Cloud All Your Access Policies Managed In One Location for All Public Cloud Apps AC VPC Public Cloud Solution: Application Connector in Public Cloud and on BIG-IP leveraging existing infrastructure at Interconnect Enable SSO with OAuth and SAML assertion for all public cloud and SaaS apps Benefits: Consolidate access control policies in one solution Easily make policy changes across app deployments Access control continuity when migrating apps AC Example apps: Salesforce Office 365 Concur Google docs

Supported

Supported

Application Security Auto Scale Cloud WAF [AWS, Azure] Advanced Traffic Management Auto Scale Cloud LTM [AWS, Azure] Deployment Topologies 1NIC VE Deployment [AWS, Azure, Google, OpenStack] 2NIC VE Deployment [AWS, Azure, Google, OpenStack] 3NIC VE Deployment [AWS, Azure, Google] n-nic VE Deployment [Azure, OpenStack] HA (Active/Active) [AWS, Azure] HA (Active/Standby) [Azure, OpenStack]

VE is available from AWS Marketplace in Good, Better & Best bundles, as well as more specific integrated solutions. Supports all core BIG-IP modules including LTM, DNS, ASM, AFM & APM as well as BIG-IQ Throughput options for BIG-IP VE s include: BYOL: 25Mbps, 200Mbps, 1Gbps & 5Gbps & 10Gbps PAYG: 25Mbps, 200Mbps, 1Gbps & 5Gbps Supports Multi-NIC configuration & Configuration Sync Deployable with CloudFormation Templates from GitHub The following integrated marketplace solutions are available using CFT s: Auto Scale WAF Auto Scale LTM (Coming Soon!) HA Pair (Coming Soon!) 2017 F5 Networks

Auto Scale WAF deployment on AWS For consistent application protection regardless of traffic volume or CPU utiiization Launches a PAYG BIG-IP VE instance with LTM and ASM provisioned for intelligent traffic management and application security. As traffic or vcpu consumption fluctuates, identical instances are automatically spun up or down to provide the optimal solution for processing application traffic. The BIG-IP instances operate with 1 network interface Scale up & Scale down events based on a pre-defined % of traffic or vcpu thresholds, typically 80% for scale up, 20% for scale down. AWS resources required include: S3 bucket, IAM role, CloudWatch, Auto Scale Group and SNS Topic. Available with PAYG instances or with BYOL licenses when used in conjuction with BIG-IQ License Manager (free). Pre-requisites to this template can be found here Manual Deployment ~ 7+ hours Templated Deployment ~ 40 mins Link to GitHub

VE is available from Azure Marketplace in Good, Better & Best bundles, as well as more specific integrated solutions. Supports all core BIG-IP modules including LTM, DNS, ASM, AFM & APM Throughput and licensing options for BIG-IP VE s include: BYOL: 25Mbps, 200Mbps, 1Gbps & 3Gbps PAYG: 25Mbps, 200Mbps & 1Gbps Supports Multi-NIC configuration & Configuration sync Deployable with Azure Resource Manager Templates from GitHub The following integrated marketplace solutions are available using ARM templates: WAF for inside ASC (BYOL) WAF for outside ASC (BYOL & PAYG) O365 Federated Access for Office365 apps (BYOL & PAYG) * Derived from Gartner G00301285 (March 24th 2016) 2017 F5 Networks

Auto Scale WAF Deployment in Azure For deploying an optimized application availability solution Deploys BIG-IP with LTM/ASM provisioned in an Auto Scaling group, to consistently provide intelligent traffic management services to applications under varying traffic loads or vcpu strain As traffic or vcpu utilization increases or decreases and crosses pre-defined thresholds, BIG-IP LTM instances are either spun up or spun down, accordingly. This solution is deployed into a new networking stack which is created along with the solution. The BIG-IP VE instance operates with 1 network interface used for both management and data plane traffic. Requires use of an Azure Load Balancer (ALB) Multiple email addresses can be added to templates to receive notifications when scaling events occur Scaling events based on either traffic throughput or vcpu consumption Available with PAYG instances or with BYOL licenses when used in conjuction with BIG-IQ License Manager (free). Manual Deployment ~ 6+ hours Templated Deployment ~ 40 mins Pre-requisites to this template can be found here Link to GitHub

VE is available from Google Cloud Launcher in Good, Better & Best bundles Supports all core BIG-IP modules including LTM, DNS, ASM, AFM & APM Throughput and licensing options include: BYOL: 25Mbps, 200Mbps, 1Gbps & 5Gbps Operates behind a Google Load Balancer for address translation Supports single NIC configuration & configuration Sync Deployable with Google Deployment Templates from GitHub * Derived from Gartner G00301285 (March 24th 2016) 2017 F5 Networks

3-NIC BIG-IP VE Deployment in Google For deploying single, standalone BIG-IP device(s) with two network interfaces Deploys a standalone BIG-IP VE in a Google VPC, where traffic automatically flows via the VE to the application servers. The BIG-IP VE instance operates with 3 network interfaces and is most similar to an on-premise deployment, with one interface for management, one for front-end application traffic and one for back end application traffic Multi-NIC configurations are necessary when deploying multiple applications on different IP addresses, or multitenant configurations. BYOL and PAYG templates available Pre-requisites to this template can be found here Google Cloud VPC Manual Deployment ~ 3+ hours Templated Deployment ~ 40 mins Link to GitHub

BIG-IP VE Client App BIG-IP instanc es

BIG-IP VE Client App BIG-IP instanc es

Enabling IT and DevOps Productivity Challenges Scale deployment of app services Agile app deployment Enable service catalogs Programmatic interfaces and tools irule traffic manipulation Cloud Solution Templates for AWS, Azure & Google icontrol API for 3 rd party integration iapp self service deployment template Key Benefits Integration with DevOps and automation toolchains (Chef, Ansible, Puppet) Automated end to end deployments reduce human errors Self service portals 2017 F5 Networks 26