F5
Networks (NASDAQ:FFIV)
announced today that it has acquired Defense.Net, Inc., a privately-held
provider of cloud-based security services for protecting data centers
and Internet applications from distributed denial-of-service (DDoS)
attacks. The advanced technologies and operational experience shared
between the two companies will expand F5’s portfolio of security
solutions for defense against Internet-based DDoS attacks on networks,
data centers, and applications. Defense.Net’s high-capacity cloud
service is complementary to F5’s existing on-premise DDoS
Protection capabilities. The combination provides customers with the
most comprehensive hybrid DDoS solution, engineered to absorb the full
threat spectrum of DDoS attacks.
Designed by DDoS industry pioneers, Defense.Net’s service is supported
by an advanced, high-throughput infrastructure to defend organizations
against the new generation of massive and sophisticated DDoS attacks.
The Defense.Net network supports multiple protocols and provides
ground-breaking features for remediation and control to safeguard
customers from unforeseen threat vectors, while maintaining application
performance.
The terms of the acquisition were not disclosed. The acquisition is not
expected to have a material impact on F5’s operating results.
Additional Resources
Quotes
“F5’s objective is to help protect customers from ever-changing security
threats before they impact their businesses,” said Manny Rivelo, EVP of
Strategic Solutions at F5. “Customers ultimately want a unified solution
that seamlessly blocks DDoS attacks at the appropriate network location
for the type of threat posed. The appeal of a hybrid F5 solution is that
it combines the best of on-premises and cloud-based protection. The
highly respected team of security experts from Defense.Net is a welcomed
addition to F5.”
“F5’s DDoS product engineering shows a comparable focus on scale and
performance to how Defense.Net has built its mitigation capability in
the cloud,” said Barrett Lyon, Founder and CTO of Defense.Net.
“Customers of all sizes will be able to ensure that business-critical
applications and networks are protected and available under the most
demanding conditions regardless of the volume, type, or source of DDoS
attack. Wherever it makes the most sense to stop an attack, F5 will
provide the customer with the right defense.”
“Sophisticated DDoS attacks combine high volume traffic-clogging with
stealthy low and slow application-targeted techniques,” said John Grady,
Research Manager for Security Products at IDC. “These hybrid attacks
will increasingly cause serious disruption for organizations. A
defense-in-depth strategy for DDoS takes a combined approach that
incorporates on-premises appliances for detecting and mitigating
mid-volume, SSL, or application-targeted attacks, while a cloud
scrubbing facility stops the volumetric attacks that are dozens of
gigabits in bandwidth from even reaching the enterprise network.”
About F5
F5 (NASDAQ:
FFIV) provides solutions for an application world. F5 helps
organizations seamlessly scale cloud, data center, and software defined
networking (SDN) deployments to successfully deliver applications to
anyone, anywhere, at any time. F5 solutions broaden the reach of IT
through an open, extensible framework and a rich partner ecosystem of
leading technology and data center orchestration vendors. This approach
lets customers pursue the infrastructure model that best fits their
needs over time. The world’s largest businesses, service providers,
government entities, and consumer brands rely on F5 to stay ahead of
cloud, security, and mobility trends. For more information, go to f5.com.
You can also follow @f5networks
on Twitter or visit us on Facebook
for more information about F5, its partners, and technologies.
F5, F5 Networks, and Defense.Net are trademarks or service marks of F5
Networks, Inc., in the U.S. and other countries.
This press release may contain forward-looking statements relating to
future events or future financial performance that involve risks and
uncertainties. Such statements can be identified by terminology such as
"may," "will," "should," "expects," "plans," "anticipates," "believes,"
"estimates," "predicts," "potential," or "continue," or the negative of
such terms or comparable terms. These statements are only predictions
and actual results could differ materially from those anticipated in
these statements based upon a number of factors including those
identified in the company's filings with the SEC.
![](http://cts.businesswire.com/ct/CT?id=bwnews&sty=20140522006599r1&sid=ntxv4&distro=nx)
Copyright Business Wire 2014