31
BIG-IP Access Policy Manager (APM) Sales Presentation Wireframe

BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

Embed Size (px)

Citation preview

Page 1: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

BIG-IP Access Policy Manager (APM) Sales Presentation Wireframe

Page 2: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

F5 BIG-IP Access Policy Manager (APM)

Page 3: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 3 © F5 Networks, Inc 3

Authentication, authorization, and SSO to all apps with F5 Application Policy Manager (APM)

Access control over third-party SaaS

Context-aware policy enforcement

Scalability and performance

Simplified policy management

Page 4: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 4 © F5 Networks, Inc 4

Security at the critical point in the network

Virtual

Physical

Cloud

Storage

Total Application Delivery Networking Services

Clients Remote access

SSL VPN

APP firewall

Page 5: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 5 © F5 Networks, Inc 5

Network

Session

Application

Web application

Physical

Client / Server

L4 Firewall: Full stateful policy enforcement and TCP DDoS mitigation

SSL inspection and SSL DDoS mitigation

HTTP proxy, HTTP DDoS and application security

Application health monitoring and performance anomaly detection

Network

Session

Application

Web application

Physical

Client / Server

Full proxy security

High-performance HW

iRules

iControl API

F5’s Approach

•  TMOS traffic plug-ins •  High-performance networking microkernel •  Powerful application protocol support

•  iControl—External monitoring and control •  iRules—Network programming language

IPv4

/IPv

6

SSL

TCP

HTTP

Optional modules plug in for all F5 products and solutions

APM

Fire

wal

l

Traffic management microkernel

Proxy

Client side

Server side SS

L

TCP

OneC

onne

ct

HTTP

Page 6: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 6 © F5 Networks, Inc 6

•  Industry’s most scalable access gateway •  Consolidates remote access, Web access management, enterprise mobility management, identity

federation and secure web gateway in a single platform •  Protects against data loss, virus infection, and rogue device access •  Replaces web access proxy tiers for common applications reducing infrastructure and management

costs

BIG-IP Access Policy Manager (APM)

Page 7: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

Benefits •  Consolidates authentication infrastructure •  Simplifies remote, web, and application access control

Features •  Scales up to 2M users on a single device •  Centralizes single sign-on (SSO) and access control

services •  Full proxy L4-L7 access control at BIG-IP speeds •  Adds endpoint inspection to the access policy •  Visual Policy Editor (VPE) provides policy-based access

control •  VPE Rules ‒ programmatic interface for custom

access policies •  Supports IPv6

BIG-IP APM Unified access and control for BIG-IP

Page 8: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 8 © F5 Networks, Inc 8

Visual Policy Editor (VPE)

Endpoint Inspection

Context Aware

Page 9: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 9 © F5 Networks, Inc 9

Identity and Access Management (IAM) solution Authentication, authorization, and SSO to all apps

Remote Access and Application Access

Federation

Secure Web Gateway

Web Access Management

Mobile Apps

Internet Apps

Enterprise Apps

Cloud, SaaS, and Partner

Apps

Internet Apps Internet

Virtual Edition Chassis Appliance

Enterprise Mobility Management

Page 10: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

Identity Federation and Single Sign-On (SSO)

Page 11: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 11 © F5 Networks, Inc 11

•  Too many agents or proxies Single Sign-On (SSO) challenges

Users

Users

Agentside Decision

Web Applications

Adaptive Authentication? External Resource?

Users

Decision? Fake AuthN?

Delegate?

Servers

Decision? Step-Up?

Change AuthZ?

SSO Server

MIDDLEWARE AGENTS

Mobile Device? Supported Platform?

BYOD? Public Cloud

?

•  Difficult to visualize single sign-on topology and deployment

•  Single sign-on require flexibility

Page 12: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 12 © F5 Networks, Inc 12

Identity Federation (SSO) benefits

AAA Server

Corporate managed device

Latest antivirus software

Expense Report App

Finance

Salesforce.com

User = Finance

•  Dramatically reduces infrastructure costs while increasing user productivity •  Provides seamless access to all web resources •  Enhances user experience •  Instantly provisions and de-provisions access to cloud apps

Page 13: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 13 © F5 Networks, Inc 13

Identity Federation architecture

Strategic Point of Control

On-Premises Infrastructure

Corporate Applications

Users

Attackers

Access Management

(APM)

SaaS Providers

Office 365

Google Apps

Salesforce

Directory Services

Corporate Users

Identity federation

SAML Real-time access control

Access policy enforcement

SAML Identity management

Multi-factor authentication

Page 14: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 14 © F5 Networks, Inc 14

Latest Identity Federation and SSO features

SAML Artifact Binding Support

RSA SecurID Software Integration SAML ECP Profile Support

•  Extends and secures SSO •  Secures transport of SAML

messages and reduces flow of SAML messages through browsers

•  Extends SSO support for automatically submitted forms

•  Simplifies secure authentication •  Dynamically detects installed RSA

SecurID software tokens and automatically retrieves randomly generated passcodes

•  Enhances user experience, decreases human error, and eases authentication and support headaches

•  Streamlines user workflow via cutting-edge SSO

•  F5 is the only vendor to extend SSO (via SAML) to include client-based apps and other browser-less environments

•  Enhances user experience, simplifies user workflow, and increases user productivity and usability

Page 15: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

Remote Access and Application Access

Page 16: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 16 © F5 Networks, Inc 16

Remote access and application access challenges

Intelligent Services Platform

Users Resources

•  Enabling secure remote access to corporate resources from any network, from any device

•  Ensuring secure and fast application performance for remote users

•  Protecting network resources, applications and data from malware, theft or hack, and/or rogue and unauthorized access

Page 17: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 17 © F5 Networks, Inc 17

Fast, secure remote access

www.f5.com

•  Fast and secure connections maximize productivity for global users •  Seamless integration minimizes cost and simplifies end user experience

Page 18: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

Web Access Management

Page 19: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 19 © F5 Networks, Inc 19

Create policy

Corporate domain

Latest AV software

Current O/S

Administrator

User = HR

HR

AAA server

Enhanced Web Access Management

832849

•  Proxy web applications to provide authentication, authorization, endpoint inspection, and more

•  All Layer 4-7 ACLS through F5’s Visual Policy Editor

Page 20: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

APM Support for Oracle Access Manager (OAM)

Before

Load balancer

Load balancer

Web apps

App 1

App 200

OAM OAM directory

After

BIG-IP LTM + APM Web apps

App 1

App 200

OAM OAM directory

Data center Data center

BIG-IP LTM + APM

OAM Proxy

Page 21: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

Enterprise Mobility Gateway (EMG)

Page 22: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 22 © F5 Networks, Inc 22

•  Ensure devices connect securely and adhere to a security posture baseline, regardless of ownership

•  Reduce the risk of malware infecting the corporate network from corporate or personal mobile device

User = Finance

App Store

HR

CRM

Finance

Corporate managed device?

Corporate managed device?

AAA Server

Enterprise Mobility Management (EMM)

Page 23: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 23 © F5 Networks, Inc 23

F5 and AirWatch

GOOD BETTER BEST

Mobile Users

BIG-IP Platform

App Wrapping + App Management

+ Reporting

Endpoint Inspection + App Tunnel Termination

+ Authentication + Access Policy Management

+ Identity Federation + Mobile App Security + Managed App Policy

Data Center

BIG-IP Advanced Firewall Manager

BIG-IP Local Traffic Manager

BIG-IP Access Policy Manager

BIG-IP Application Security Manager

Simplified Business Models

App Tunnel + App Policy

Managed Apps

Unmanaged Apps

No data transfer

Data transfer

AFM LTM APM ASM

Salesforce.com

EMM

Remote Access Mobile

Application

Email

Authentication Store

Application Access Management

Page 24: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 24 © F5 Networks, Inc 24

•  Mobile device management (MDM)

•  F5 mobile client provisioning and configuration

•  Certificate and app provisioning

•  Remote lock and wipe

Secure, managed mobile access, apps and devices

•  Per app VPN •  Secure remote (SSL VPN)

access •  Supports ActiveSync and

other proxy services •  Granular access policy

management •  Application access

management •  Federated identity/SSO

F5 delivers

•  Mobile application management (MAM)

•  Workspace application •  File readers and editors •  File systems and portal

access •  Hardened endpoint client,

webapp •  App wrapping

AirWatch delivers

Page 25: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

Simplified VDI

Page 26: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 26 © F5 Networks, Inc 26

AAA server

RDP

View

XenDesktop Virtual desktops

VDI VDI VDI VDI

Hypervisor

Virtual desktops

VDI VDI VDI VDI

Hypervisor

Virtual desktops

VDI VDI VDI VDI

Hypervisor

•  Improved scale and reliability •  Better user experience + SSO •  Simplified deployment •  Improved quality of real-time applications •  Unified access control and security

Simplified VDI

VDI VDI VDI

Page 27: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 27 © F5 Networks, Inc 27

Operational complexities of Citrix Cloud Gateway

User devices

Citrix Cloud Gateway

NetScaler Access

Gateway

StoreFront AppController

Fragmented application access and policy management

Firewall Firewall

Mobile apps

SaaS apps

Web apps

Citrix ShareFile

data Virtual

Applications

Hypervisor

Page 28: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 28 © F5 Networks, Inc 28

Application delivery for Citrix VDI Single Platform

User devices

Mobile apps

SaaS apps

Web apps

Citrix ShareFile

data

Application Delivery for Citrix VDI

BIG-IP APM

Virtual Applications

Hypervisor

Page 29: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

© F5 Networks, Inc 29 © F5 Networks, Inc 29

VMware Horizon View architecture

Strategic Point of Control

Authentication

HTTPS

PCoIP

VDI Infrastructure

External Users

On-Premises Infrastructure

HTTPS

PCoIP

HTTP/S

PCoIP

Internal Users

Access Management

(APM)

SSL Decryption Authentication High Availability

PCoIP Proxy

Page 30: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control

PCoIP Proxy – Simplify your architecture

Page 31: BIG-IP Access Policy Manager (APM) - Westcon-Comstorbe.security.westcon.com/documents/55262/F5_APM_presentation.pdf · apps with F5 Application Policy Manager (APM) Access control