ADCs Taking on Larger Security Role

1 | 2 | 3 | 4 | 5
Previous ADCs Taking on Larger Security Role-1 Next

Click through for results from a ADC security survey conducted by F5 Networks, Inc.

One of the more vexing challenges facing IT organizations these days is finding a way to better defend both applications and the network. Increasingly, hackers are finding their way around firewall defenses by targeting Web applications, so abandoning perimeter defenses doesn’t make any sense. Alan Murphy, senior technical marketing manager for F5 networks, a provider of application delivery controllers (ADCs), says that IT organizations need a way to proactively manage application and network security in concert with one another to reduce costs. That platform, argues Murphy, should be ADCs that not only have visibility into the network, but also into what applications are being accessed.

In a worldwide survey conducted by Applied Research on behalf of F5 Networks, about half of the 1,000 large organizations surveyed said they see ADCs as being a platform that could eliminate the need for some security appliances, while one-third said they were already using ADCs in that context.

Obviously, next-generation firewall vendors are making many of the same claims. What appears to be happening is a convergence of functionality at the edge of the network as ADCs evolve into a platform capable of providing multiple services, including security.

Murphy says this approach is going to prove critical over time because existing approaches to network and application security require the deployment of separate layers of security that are generally poorly integrated. Converging those functions around one integrated platform, says Murphy, not only makes economic sense, but it should also lead to better security by making it easier to correlate information across different classes of attacks.

Something is clearly wrong with IT security given the frequency of attacks and the actual amount of real dollars being lost. The challenge facing IT organizations is how to come up with a comprehensive approach to security that makes it easier to first identify those threats and then combat them in a single motion. It’s not quite clear what approach will ultimately provide that capability, but somewhere between the ADC and a next-generation firewall there probably is an answer.

More Slideshows:

Ten Apple Apps for BusinessApple apps to help increase business productivity.

Top Eight Features in Windows Server 8 Windows Server 8 is a technically sophisticated operating system that is crammed with features that bring many previously enterprise-only capabilities to small and mid-sized businesses.

Seven Points CIOs Must Know About the Board of Directors Seven areas that CIOs must understand and act upon in order to effectively work with the board.


Related Topics : Blade Servers, Business Integration, Ethernet, LAN, Network Protocols

More Slideshows

IIoT IIoT Gaining Momentum in Adoption and Results

Cost reduction has been the main driver of IIoT adoption. Other contributors are the emergence of ancillary and complementary technologies, including low-power hardware devices, the cloud, Big Data analytics, robotics and automation and smart sensors. ...  More >>

InfoBuildersIoTData0x Capitalizing on IoT Data: The Golden Rule for Data Success

The key to truly capitalizing on IoT data is a well-established, integrated information management strategy. ...  More >>

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.