CONFIDENTIAL CDCA'S SMALL BUSINESS AND INDUSTRY OUTREACH INITIATIVE "SBIOI 29" John Manning, Federal Account Manager July 18, 2013 Question 1: The name F5 originated from: a) It’s the 5th letter in the alphabet b) The computer function F5 key, to fire up a display c) The movie Twister Company Snapshot • Leading provider of Application Delivery Networking products that optimize the security, performance & availability of network applications, servers and storage systems Revenue 400 Service 350 Product 300 250 Founded 1996 / Public 1999 • Approx. 3,030 employees • FY11 Revenue: $1.2B 200 $ Millions • 150 100 50 4Q12 3Q12 2Q12 1Q12 4Q11 3Q11 2Q11 FY12 Revenue: $1.4B 1Q11 • 4Q10 0 Gartner Magic Quadrant for ADC "This Magic Quadrant graphic was published by Gartner, Inshould be evaluated in the context of the entire report. The Gartner report is available upon request from F5."The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose c. as part of a larger research note and • F5's internal knowledgebase and understanding of diverse and complex application environments makes it the top choice for complex environments. • F5 has a broad and comprehensive vision, with industry-leading understanding of the needs of application development, deployment and management. Gartner Magic Quadrant for SSL VPN "This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from F5."The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose Question 2: What is F5 best known for: a) iRules b) Load Balancer c) Security d) Mobile Customization “Stovepipes” of Technology iControl iRules Solutions Security Application Load Security Balancing Web Application Firewall SOA Access CAC / PIV SSO Availability SSL VPN Traffic Management Operating System Application VDI / WAN Acceleration BYOD Optimization Application Delivery Services Global Load Balancing DNSSEC IP v6 6:4|4:6 Question 3: F5 supports the following VDI : a) VMware b) Citrix c) Microsoft d) All of the Above Full Proxy Security F5’s Approach Client / Server Session SSL inspection and SSL DDoS mitigation Network L4 Firewall: Full stateful policy enforcement and TCP DDoS mitigation Application TCP OneConnect SSL Server side HTTP Client side Client / Server Web application … Proxy HTTP proxy, HTTP DDoS and application security SSL TCP Application Application health monitoring and performance anomaly detection Traffic management microkernel HTTP IPv4/IPv6 Web application APM Firewall Optional modules plug in for all F5 products and solutions Session Network iRules Physical • • • High-performance HW TMOS traffic plug-ins High-performance networking microkernel Powerful application protocol support • • iControl API iControl—External monitoring and control iRules—Network programming language Physical Question 4: What type’s of DDoS attacks does F5 protect against? a) Simple Network Attacks: SYN Floods, Connection Floods, UDP & CMP Floods b) DNS Attacks: UDP Floods, NXDOMAIN Query Floods c) HTTP Floods: Recursive-gets, Slowloris, SSL Attacks, SSL Renegotiation d) All of the Above High Value Customer Support -Slash Response Times Extensibility delivers protection sooner Help needed One hour later One week later DevCentral request F5 validates and posts fix Apache releases fix A user asks for help to avoid an exploit on Apache One hour later… the customer deployed and validated the fix One week later… testing and rollout still needs to take place. Question 5: DevCentral has approximately how many members: a) 10,000 users b) 50,000 users c) What’s DevCentral? d) 110,000+ users Small Business Quote- Tapestry Technologies "As a small business providing IT services to the federal government it is difficult to differentiate in a highly competitive marketplace. Through partnering with F5, we have been able to learn F5 products, pair that with our knowledge of the customer's environment and bring innovative solutions to our customers. Partnering with F5 has helped us set ourselves apart and brought huge benefits to Tapestry Technologies." F5 Networks and University of Phoenix Collaborate to Create Application Delivery Networking Certificate Program • “One of the challenges is to find individuals with the appropriate skill set and, more importantly, retaining the people with these difficult-to-find skills, as there is a recognized shortage and many with this skill will gravitate to the vendor community,” wrote Mark Fabbi and Joe Skorupa of Gartner. “The role played by the application delivery architect demands strong people skills and broad technical skills.” • http://www.f5.com/about/news/press/2013/20130709/ F5 GUARDIAN Professional Services Program • Designed to help UNITY partners that have established consulting and professional services practices achieve increased sales, higher margins and more strategic customer relationships. Benefits of the Guardian Program • 20% off F5 Authorized Training Centers’ course list price • Early access to F5 product technical training including a hosted lab environment. • Free F5 Professional Certification Program beta exam vouchers • Invitation to participate in the Professional Services technical forum • On-request access to F5 Professional Services assistance • Visibility on the F5 corporate website • Opportunity to participate in joint media outreach • Access to select research on best practices for Professional Services teams Where we can use your help? • Consider partnering with F5 • Engage Technical Architects, Security Architects, Enterprise Architects, Virtualization, SharePoint, Web Apps, etc…. • Get Smart on BIG-IP • • • • Free LTM Training Lunch and Learns Proof of Concepts DevCentral • Certified personnel supporting our platform, including Traffic Management, Access Policy, Web Application Firewall, and more. John Manning (703) 898-4135 j.manning@f5.com Visit us at the CDCA C5ISR SUMMIT November 12-15, 2013