Click here to close now.


News Feed Item

F5 Networks Acquires Defense.Net, Inc.

F5 Networks (NASDAQ:FFIV) announced today that it has acquired Defense.Net, Inc., a privately-held provider of cloud-based security services for protecting data centers and Internet applications from distributed denial-of-service (DDoS) attacks. The advanced technologies and operational experience shared between the two companies will expand F5’s portfolio of security solutions for defense against Internet-based DDoS attacks on networks, data centers, and applications. Defense.Net’s high-capacity cloud service is complementary to F5’s existing on-premise DDoS Protection capabilities. The combination provides customers with the most comprehensive hybrid DDoS solution, engineered to absorb the full threat spectrum of DDoS attacks.

Designed by DDoS industry pioneers, Defense.Net’s service is supported by an advanced, high-throughput infrastructure to defend organizations against the new generation of massive and sophisticated DDoS attacks. The Defense.Net network supports multiple protocols and provides ground-breaking features for remediation and control to safeguard customers from unforeseen threat vectors, while maintaining application performance.

The terms of the acquisition were not disclosed. The acquisition is not expected to have a material impact on F5’s operating results.

Additional Resources


“F5’s objective is to help protect customers from ever-changing security threats before they impact their businesses,” said Manny Rivelo, EVP of Strategic Solutions at F5. “Customers ultimately want a unified solution that seamlessly blocks DDoS attacks at the appropriate network location for the type of threat posed. The appeal of a hybrid F5 solution is that it combines the best of on-premises and cloud-based protection. The highly respected team of security experts from Defense.Net is a welcomed addition to F5.”

“F5’s DDoS product engineering shows a comparable focus on scale and performance to how Defense.Net has built its mitigation capability in the cloud,” said Barrett Lyon, Founder and CTO of Defense.Net. “Customers of all sizes will be able to ensure that business-critical applications and networks are protected and available under the most demanding conditions regardless of the volume, type, or source of DDoS attack. Wherever it makes the most sense to stop an attack, F5 will provide the customer with the right defense.”

“Sophisticated DDoS attacks combine high volume traffic-clogging with stealthy low and slow application-targeted techniques,” said John Grady, Research Manager for Security Products at IDC. “These hybrid attacks will increasingly cause serious disruption for organizations. A defense-in-depth strategy for DDoS takes a combined approach that incorporates on-premises appliances for detecting and mitigating mid-volume, SSL, or application-targeted attacks, while a cloud scrubbing facility stops the volumetric attacks that are dozens of gigabits in bandwidth from even reaching the enterprise network.”

About F5

F5 (NASDAQ: FFIV) provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends. For more information, go to

You can also follow @f5networks on Twitter or visit us on Facebook for more information about F5, its partners, and technologies.

F5, F5 Networks, and Defense.Net are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries.

This press release may contain forward-looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
In his session at DevOps Summit, Bryan Cantrill, CTO at Joyent, will demonstrate a third path: containers on multi-tenant bare metal that maximizes performance, security, and networking connectivity.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Chris Van Tuin, Chief Technologist for the Western US at Red Hat, has over 20 years of experience in IT and Software. Since joining Red Hat in 2005, he has been architecting solutions for strategic customers and partners with a focus on emerging technologies including IaaS, PaaS, and DevOps. He started his career at Intel in IT and Managed Hosting followed by leadership roles in services and sales engineering at Loudcloud and Linux startups.
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
DevOps is gaining traction in the federal government – and for good reasons. Heightened user expectations are pushing IT organizations to accelerate application development and support more innovation. At the same time, budgetary constraints require that agencies find ways to decrease the cost of developing, maintaining, and running applications. IT now faces a daunting task: do more and react faster than ever before – all with fewer resources.