Welcome!

CMS Authors: Mehdi Daoudi, Rishi Bhargava, Harry Trott, Xenia von Wedel, Carmen Gonzalez

News Feed Item

F5 Wins 2010 SC Magazine Reader Trust Award

F5 Networks, Inc. (NASDAQ:FFIV), the global leader in Application Delivery Networking, has been recognized with SC Magazine’s 2010 Reader Trust Award for the Best Web Application Security Solution. The announcement was made this week at the SC Awards Gala, held in conjunction with the annual RSA Conference in San Francisco.

F5’s BIG-IP® Application Security Manager (ASM) was chosen as the Best Web Application Security Solution by the Reader Trust Voting Panel—composed of security and technology experts from large, medium, and small enterprises from major vertical markets—representing the wide distribution of SC Magazine readers. With an unprecedented number of entries submitted, the 2010 SC Awards were the most competitive in the program’s history.

SC Magazine’s panel of judges in the Reader Trust category have voted for F5 from among hundreds of high-quality, competitive entries,” said Illena Armstrong, Editor in Chief, SC Magazine. “Winning a Reader Trust Award is proof of F5’s efforts to address the IT security issues that are top-of-mind for industry professionals.”

“We are thrilled that BIG-IP ASM has been chosen for the second year in a row as the industry’s Best Web Application Security Solution by SC Magazine’s readers,” said Ron Talmor, VP of Product Development at F5. “Our goal is to make it easy for IT professionals to comply with security regulations, protect their businesses from attacks, and adapt to emerging threats. We’re pleased that BIG-IP ASM continues to be recognized as the best application security solution available that enables organizations to securely deploy the applications that drive their business.”

BIG-IP Application Security Manager is an advanced web application firewall that significantly mitigates the risk of loss or damage to data, intellectual property, and web applications. It provides end-to-end application protection, advanced monitoring, and centralized reporting, and it also addresses key regulatory mandates such as PCI DSS, HIPAA, Basel II, and SOX.

“BIG-IP ASM provides an advantage over standalone solutions because it can be combined with advanced application services such as acceleration and web access management in a comprehensive Application Delivery Controller solution,” Talmor added. “It also comes with pre-built application security policies that provide out-of-the-box protection for popular applications such as Microsoft Outlook Web Access, SharePoint, Lotus Domino Mail Server, and Oracle E-Business Financials.”

The annual SC Awards highlight and showcase the best solutions, services, and professionals in the information security industry. The F5® FirePass® SSL VPN solution also was chosen as one of six finalists for a Reader Trust Award in the Best IPsec/SSL VPN Solution category. FirePass ensures that organizations can provide secure, convenient access to applications through outstanding performance, scalability, availability, policy management, and endpoint security. For more information and a detailed list of categories and winners, please visit www.scmagazineus.com/2010-awards-winners/section/1452/.

Additional Resources

About SC Magazine

SC Magazine provides IT security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought-leaders and the best, most extensive collection of product reviews in the business. By offering a consolidated view of IT security through independent product tests and well-researched editorial content that provides the contextual backdrop for how these IT security tools will address larger demands put on businesses today, SC Magazine enables IT security pros to make the right security decisions for their companies. Besides the monthly print magazine and daily website, the brand’s portfolio includes the SC Awards, SC Directory, SC Magazine Newswire, SC World Congress, and SC Congress Canada.

About F5 Networks

F5 Networks is the global leader in Application Delivery Networking (ADN), focused on ensuring the secure, reliable, and fast delivery of applications. F5’s flexible architectural framework enables community-driven innovation that helps organizations enhance IT agility and dynamically deliver services that generate true business value. F5’s vision of unified application and data delivery offers customers an unprecedented level of choice in how they deploy ADN solutions. It redefines the management of application, server, storage, and network resources, streamlining application delivery and reducing costs. Global enterprise organizations, service and cloud providers, and Web 2.0 content providers trust F5 to keep their business moving forward. For more information, go to www.f5.com.

F5, BIG-IP, Application Security Manager, ASM, and FirePass are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.

This press release may contain forward-looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions, and actual results could differ materially from those anticipated in these statements based upon a number of factors, including those identified in the company's filings with the SEC.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...