SlideShare a Scribd company logo
1 of 17
Download to read offline
2013 F5 ANNUAL MEDIA MEET
NEW RELEASES AND SOLUTIONS
ANNOUNCEMENTS

         Linda Hui – Managing Director, Hong Kong & Taiwan
         Alan Murphy – Senior Technical Marketing Manager
         Kunaciilan Nallappan – Senior Product Marketing Manager, APJ

  CONFIDENTIAL – INTERNAL ONLY
F5 in 2012
                                 • Strong global revenues: $1.38B, up 20% from
                                   $1.15B in fiscal year 2011
                                 • Expanded cloud support: new BIG-IP virtual
  Global highlights                solutions for Amazon Web Services
                                 • Winner of 2012 APAC Frost & Sullivan ADC vendor
                                   of the year awards


                                                             Asia Pacific &
   • Asia Pacific grew 16% year over year
   • In Hong Kong, vertical market penetration and            Hong Kong
     Security market expansion                                highlights
2013 Market/Technology Predictions
         Application Delivery


                    1   Growth of applications in business
                        Experts predict that 71% of work will be done via web-based or mobile apps by 2020


         Security
                        Rise of 3D multi-layered DDoS attacks and DNS attacks
                    2   Security attacks are becoming multi-dimensional: not just focused on the network, application or web layer but all
                        three.



                    3   BYOD 2.0
                        Management and security surface will shrink inside the device to cover only enterprise applications and their data.


         Cloud

                    4   Cloud control
                        63% of enterprises that have implemented cloud solutions reported improved agility in supporting the needs of the
                        business. But challenges still remain in maintaining control across traditional and cloud architectures



                        Focus on enterprise-class applications
                    5   As organizations complete migration of low-hanging fruit to the cloud, focus will turn to enterprise-class
                        applications which will renew interest and demand for architectural similarity in cloud computing environments.
Business Landscape
          Webification of Apps                                                           Cloud Integration and Control


                   69% of all Americans say they
                   used web apps


                                                                             Agility - 63% of enterprises who   Orchestration - 79% of enterprises
                                                                             have implemented cloud             who have implemented process
71% of surveyed internet, technology, and social
                                                                                                                automation have experienced
experts predict most work will be done via web-                              solutions reported improved
                                                                                                                 time savings, 69% claim improved
                                                                             agility in supporting the
based or mobile apps by 2020                                                                                    productivity.
                                                                             needs of the business.
                                                                                                                .
                                                   Shifting Perimeter

                                         •   80% of net new apps will target the cloud

                                         •   Industry survey lists Security as the most important challenge
                                             with the cloud today

                                         •   Over 72% of IT Decision makers cited that they have or will in
                                             the next year move email, web services, storage and
                                             collaboration solutions to the public or private cloud
Introducing The Intelligent Services framework


      Unmatched Programmability: Built in customization                       DevCentral
      with an extensible and programmable architecture
      (iRules, iApps & iControl)                                iRules         iControl         iApps



      Unified Services: Delivers dynamic application delivery                    Fast

New   services from the datacenter to the device
                                                                              Available

                                                                               Secure

      Application Fluency and Scale: Adapts to shifting
                                                                                TMOS
New   requirements of performance and application and user
      needs with Platforms and Traffic Management OS               Hardware                Software
Traditional Application Delivery Challenges



                                            SaaS    App servers   Storage




                    Firewall
                                            ADC     App servers   Storage




   Clients
                                            Cloud

More Endpoints       More Delivery Models                  More Apps
Solution: An Intelligent Services framework


                                                                              Physical




                                                                               Virtual
                                                                                                    Storage
                                An Intelligent Services framework
                              connects any user, anywhere, from any
                             device to the best application resources,
                                  independent of infrastructure.

Clients                                                                         Cloud



 Anywhere, any service, any device              Intelligent              Dynamic, agile, adaptive
Our Customers Benefit from:
    Dynamic Use of IT         • F5 ScaleN Technology
    Resources with for        • Application Performance Visibility
Operational Efficiency        • Intelligent Services Platform


   Flexible Deployment
                              • Physical, Virtual and Cloud
    Options for Cost
     Effectiveness            • Any device, Any App, Any Cloud


   Protect Application
     Infrastructure with
  Unmatched Speed and         • Application Delivery Firewall
 Scalability – Improve App
Resilience and reduce costs
Cloud: Maximize resources, Ensure App availability
                                              Scale Up – Vertical Growth
                                                     On – Demand Chassis
                                                1    Performance On-Demand with modular blades for linear scalability with
                                                     Plug-and-Grow technology

                                              Scale In – Device Virtualization
                                                     Multi-Tenant Device Domains
                                                2    Device virtualization provides large scale administrative and routing separation
                                                     with shared operating system

                                                     Virtualization – vCMP
                                                3    Device virtualization with isolated operating system and resources


                                              Scale Out – Horizontal Clustering
  Consolidate, distribute, and scale                 Device Clustering
  application delivery services up, in, and
  out of the data center with ScaleN            4    Device Service Clustering provides scaling and configuration syncing for up to 32
                                                     devices, enabling true multi-site horizontal scaling

                                                     Application Service Clustering

                                                5    Application Service Clustering delivers sub-second system failover and
                                                     comprehensive connection mirroring, resulting in a highly available cluster for
                                                     up to 8 devices
Flexible Virtual Environment and Cloud
Deployment Options
             Unmatched flexibility across all major virtualization platforms.

                                                                          Performance



                                                                            3Gbps
                               Private               Public
 Amazon AWS
 Citrix XenServer
 Microsoft Hyper-V
 KVM
 VMware vSphere
Complexity of Security

Webification of apps                                       Device proliferation
                                                                               95% of workers use at least
                      71% of internet    experts predict                       one personal device for work.
                      most people will do work via web
                      or mobile by 2020.                                       130 million enterprises will
                                                                               use mobile apps by 2014



Evolving security threats                                  Shifting perimeter
58% of all e-theft tied                                    80% of new apps will
to activist groups.                                        target the cloud.

81% of breaches                                            72% IT leaders have or will
involved hacking                                           move applications to the cloud.
Customer Business Needs

            To scale                     To secure                           To simplify




Scale for a work-anywhere /   Security for applications and data   Simplification of point solutions and
SSL everywhere world.         against sustained attacks.           complex firewall configurations.
Introducing F5’s Application Delivery Firewall
(Advanced Firewall Manager)

 Aligning applications with firewall security


                                                One Platform




   ICSA-certified   Application   Application    Access         DDoS           SSL              DNS
      firewall       Delivery      Security      Control       Mitigation   Inspection         Security
                    Controller




                                                                                            EAL2+
                                                                                         EAL4+ (in process)
New approach to security
   Secure access to applications and data from anywhere
   while protecting them wherever they reside

   Provide the best end-to-end security with Full-proxy DC firewall with
   #1 ADC, secure access and application security

   Simplify the network while maximizing security,
   scale and performance

   Take advantage of intelligent services platform

   Experience top-quality extensibility and flexibility
Best in Class Performance Appliance
NEW ScaleN Enabled BIG-IP Platforms

  Broadest hypervisor                Cloud ready - unmatched                    Best in class platforms from
  support for advanced ADC           flexibility with ScaleN                    entry level to the highest
  in private and public clouds                                                  performing ADC in the
                                                                                world




  BIG-IP VE      BIG-IP 2000s       BIG-IP 2200s          BIG-IP 4200v         BIG-IP 10200v   VIPRION 4800
 Up to 3Gbps     212K L7 RPS        425K L7 RPS           850k L7 RPS            2M L7 RPS      20M L7 RPS

                                 Purpose Built and Carrier Grade Reliability
F5 in Application Delivery
    Highest scaling and performing firewall
    in the world

    Full-proxy firewall for best security
                                                              Application Delivery
                                                                    Firewall
    Simplification of network through consolidation of
    network and security functions

                                     Broadest hypervisor support for advanced ADC in
                                     private and public clouds

                                     Cloud ready – unmatched flexibility with ScaleN
New ScaleN Enabled
 BIG-IP Platforms                    Best in class platforms from entry level to the
                                     highest performing ADC in the world
F5 network presenation 2013 Q1

More Related Content

What's hot

Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012Internap
 
Nyc lunch and learn 03 15 2012 final
Nyc lunch and learn   03 15 2012 finalNyc lunch and learn   03 15 2012 final
Nyc lunch and learn 03 15 2012 finalInternap
 
Shubhi_Resume_Updated
Shubhi_Resume_UpdatedShubhi_Resume_Updated
Shubhi_Resume_UpdatedShubhi Jain
 
Network and Application Visibility—Why You Need It More Than Ever Before
Network and Application Visibility—Why You Need It More Than Ever BeforeNetwork and Application Visibility—Why You Need It More Than Ever Before
Network and Application Visibility—Why You Need It More Than Ever BeforeRiverbed Technology
 
ENT103 Making the Case for Cloud - AWS re: Invent 2012
ENT103 Making the Case for Cloud - AWS re: Invent 2012ENT103 Making the Case for Cloud - AWS re: Invent 2012
ENT103 Making the Case for Cloud - AWS re: Invent 2012Amazon Web Services
 
Transforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesTransforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesRehanShrivastav
 
AbiCloud Webinar 1.0
AbiCloud Webinar 1.0AbiCloud Webinar 1.0
AbiCloud Webinar 1.0Abiquo, Inc.
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For VirtualizationPatricio Campos
 
DevOps for IBM Commerce
DevOps for IBM CommerceDevOps for IBM Commerce
DevOps for IBM CommerceMichael Elder
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud StrategyInternap
 
Becloud hybrid cloud
Becloud hybrid cloudBecloud hybrid cloud
Becloud hybrid cloudBecloud
 
Go Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center TechnologiesGo Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center Technologiesdoan_slideshares
 
Building and Managing Cloud Applications and Infrastructure
Building and Managing Cloud Applications and InfrastructureBuilding and Managing Cloud Applications and Infrastructure
Building and Managing Cloud Applications and InfrastructureDarren Cunningham
 
The Enterprise Business Case for Cloud Transformation: Introducing Everest Gr...
The Enterprise Business Case for Cloud Transformation: Introducing Everest Gr...The Enterprise Business Case for Cloud Transformation: Introducing Everest Gr...
The Enterprise Business Case for Cloud Transformation: Introducing Everest Gr...Everest Group
 
Having the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CareHaving the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CarePeter Coffee
 

What's hot (20)

Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
 
Nyc lunch and learn 03 15 2012 final
Nyc lunch and learn   03 15 2012 finalNyc lunch and learn   03 15 2012 final
Nyc lunch and learn 03 15 2012 final
 
Vshere 5
Vshere 5Vshere 5
Vshere 5
 
Shubhi_Resume_Updated
Shubhi_Resume_UpdatedShubhi_Resume_Updated
Shubhi_Resume_Updated
 
Getting cloud computing right
Getting cloud computing rightGetting cloud computing right
Getting cloud computing right
 
Network and Application Visibility—Why You Need It More Than Ever Before
Network and Application Visibility—Why You Need It More Than Ever BeforeNetwork and Application Visibility—Why You Need It More Than Ever Before
Network and Application Visibility—Why You Need It More Than Ever Before
 
ENT103 Making the Case for Cloud - AWS re: Invent 2012
ENT103 Making the Case for Cloud - AWS re: Invent 2012ENT103 Making the Case for Cloud - AWS re: Invent 2012
ENT103 Making the Case for Cloud - AWS re: Invent 2012
 
Transforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesTransforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan services
 
The Exinda WAN Optimization Appliance - Jason Whitaker, Transylvania University
The Exinda WAN Optimization Appliance - Jason Whitaker, Transylvania UniversityThe Exinda WAN Optimization Appliance - Jason Whitaker, Transylvania University
The Exinda WAN Optimization Appliance - Jason Whitaker, Transylvania University
 
AbiCloud Webinar 1.0
AbiCloud Webinar 1.0AbiCloud Webinar 1.0
AbiCloud Webinar 1.0
 
Whitepaper: DevOps - Happiest Minds
Whitepaper: DevOps - Happiest MindsWhitepaper: DevOps - Happiest Minds
Whitepaper: DevOps - Happiest Minds
 
MobileFirst
MobileFirstMobileFirst
MobileFirst
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
 
DevOps for IBM Commerce
DevOps for IBM CommerceDevOps for IBM Commerce
DevOps for IBM Commerce
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 
Becloud hybrid cloud
Becloud hybrid cloudBecloud hybrid cloud
Becloud hybrid cloud
 
Go Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center TechnologiesGo Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center Technologies
 
Building and Managing Cloud Applications and Infrastructure
Building and Managing Cloud Applications and InfrastructureBuilding and Managing Cloud Applications and Infrastructure
Building and Managing Cloud Applications and Infrastructure
 
The Enterprise Business Case for Cloud Transformation: Introducing Everest Gr...
The Enterprise Business Case for Cloud Transformation: Introducing Everest Gr...The Enterprise Business Case for Cloud Transformation: Introducing Everest Gr...
The Enterprise Business Case for Cloud Transformation: Introducing Everest Gr...
 
Having the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CareHaving the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should Care
 

Similar to F5 network presenation 2013 Q1

Cloud computing in south africa reality or fantasy
Cloud computing in south africa   reality or fantasyCloud computing in south africa   reality or fantasy
Cloud computing in south africa reality or fantasySamantha James
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterGeneXus
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's nextDuffy Fron
 
Basics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.comBasics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.comDeepu S Nath
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Sverige
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Jeremy Siewert
 
Cloud computing
Cloud computingCloud computing
Cloud computingRazib M
 
Enterprise mobility and cloud
Enterprise mobility and cloudEnterprise mobility and cloud
Enterprise mobility and cloudKamesh Pemmaraju
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdeliveryKelly Emo
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADFF5 Networks
 
Cloud Azure Market Research and Service Offerings by RapidValue
Cloud Azure Market Research and Service Offerings by RapidValueCloud Azure Market Research and Service Offerings by RapidValue
Cloud Azure Market Research and Service Offerings by RapidValueRapidValue
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksDevOps.com
 
Rational federal symposium mobile development in government
Rational federal symposium   mobile development in governmentRational federal symposium   mobile development in government
Rational federal symposium mobile development in governmentRoger Snook
 
Transforming Your Business Management with Cloud Computing
Transforming Your Business Management with Cloud ComputingTransforming Your Business Management with Cloud Computing
Transforming Your Business Management with Cloud ComputingInnoTech
 
Cloud - DC Poland Open Days
Cloud - DC Poland Open DaysCloud - DC Poland Open Days
Cloud - DC Poland Open DaysAndrzej Osmak
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecaseRENJITHKNAIR5
 

Similar to F5 network presenation 2013 Q1 (20)

Cloud computing in south africa reality or fantasy
Cloud computing in south africa   reality or fantasyCloud computing in south africa   reality or fantasy
Cloud computing in south africa reality or fantasy
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao Datacenter
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
Basics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.comBasics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.com
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Enterprise mobility and cloud
Enterprise mobility and cloudEnterprise mobility and cloud
Enterprise mobility and cloud
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdelivery
 
Kuliza's ZaCloud
Kuliza's ZaCloudKuliza's ZaCloud
Kuliza's ZaCloud
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADF
 
Cloud Azure Market Research and Service Offerings by RapidValue
Cloud Azure Market Research and Service Offerings by RapidValueCloud Azure Market Research and Service Offerings by RapidValue
Cloud Azure Market Research and Service Offerings by RapidValue
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 
Rational federal symposium mobile development in government
Rational federal symposium   mobile development in governmentRational federal symposium   mobile development in government
Rational federal symposium mobile development in government
 
Transforming Your Business Management with Cloud Computing
Transforming Your Business Management with Cloud ComputingTransforming Your Business Management with Cloud Computing
Transforming Your Business Management with Cloud Computing
 
Cloud - DC Poland Open Days
Cloud - DC Poland Open DaysCloud - DC Poland Open Days
Cloud - DC Poland Open Days
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 

More from Andrew Wong

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing ReportAndrew Wong
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongAndrew Wong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Andrew Wong
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail IndustryAndrew Wong
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBAndrew Wong
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapAndrew Wong
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in MarketingAndrew Wong
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13Andrew Wong
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Andrew Wong
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution GuideAndrew Wong
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyAndrew Wong
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization surveyAndrew Wong
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user studyAndrew Wong
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportAndrew Wong
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials PresentationAndrew Wong
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web ServicesAndrew Wong
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 

More from Andrew Wong (20)

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials Presentation
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

F5 network presenation 2013 Q1

  • 1. 2013 F5 ANNUAL MEDIA MEET NEW RELEASES AND SOLUTIONS ANNOUNCEMENTS Linda Hui – Managing Director, Hong Kong & Taiwan Alan Murphy – Senior Technical Marketing Manager Kunaciilan Nallappan – Senior Product Marketing Manager, APJ CONFIDENTIAL – INTERNAL ONLY
  • 2. F5 in 2012 • Strong global revenues: $1.38B, up 20% from $1.15B in fiscal year 2011 • Expanded cloud support: new BIG-IP virtual Global highlights solutions for Amazon Web Services • Winner of 2012 APAC Frost & Sullivan ADC vendor of the year awards Asia Pacific & • Asia Pacific grew 16% year over year • In Hong Kong, vertical market penetration and Hong Kong Security market expansion highlights
  • 3. 2013 Market/Technology Predictions Application Delivery 1 Growth of applications in business Experts predict that 71% of work will be done via web-based or mobile apps by 2020 Security Rise of 3D multi-layered DDoS attacks and DNS attacks 2 Security attacks are becoming multi-dimensional: not just focused on the network, application or web layer but all three. 3 BYOD 2.0 Management and security surface will shrink inside the device to cover only enterprise applications and their data. Cloud 4 Cloud control 63% of enterprises that have implemented cloud solutions reported improved agility in supporting the needs of the business. But challenges still remain in maintaining control across traditional and cloud architectures Focus on enterprise-class applications 5 As organizations complete migration of low-hanging fruit to the cloud, focus will turn to enterprise-class applications which will renew interest and demand for architectural similarity in cloud computing environments.
  • 4. Business Landscape Webification of Apps Cloud Integration and Control 69% of all Americans say they used web apps Agility - 63% of enterprises who Orchestration - 79% of enterprises have implemented cloud who have implemented process 71% of surveyed internet, technology, and social automation have experienced experts predict most work will be done via web- solutions reported improved time savings, 69% claim improved agility in supporting the based or mobile apps by 2020 productivity. needs of the business. . Shifting Perimeter • 80% of net new apps will target the cloud • Industry survey lists Security as the most important challenge with the cloud today • Over 72% of IT Decision makers cited that they have or will in the next year move email, web services, storage and collaboration solutions to the public or private cloud
  • 5. Introducing The Intelligent Services framework Unmatched Programmability: Built in customization DevCentral with an extensible and programmable architecture (iRules, iApps & iControl) iRules iControl iApps Unified Services: Delivers dynamic application delivery Fast New services from the datacenter to the device Available Secure Application Fluency and Scale: Adapts to shifting TMOS New requirements of performance and application and user needs with Platforms and Traffic Management OS Hardware Software
  • 6. Traditional Application Delivery Challenges SaaS App servers Storage Firewall ADC App servers Storage Clients Cloud More Endpoints More Delivery Models More Apps
  • 7. Solution: An Intelligent Services framework Physical Virtual Storage An Intelligent Services framework connects any user, anywhere, from any device to the best application resources, independent of infrastructure. Clients Cloud Anywhere, any service, any device Intelligent Dynamic, agile, adaptive
  • 8. Our Customers Benefit from: Dynamic Use of IT • F5 ScaleN Technology Resources with for • Application Performance Visibility Operational Efficiency • Intelligent Services Platform Flexible Deployment • Physical, Virtual and Cloud Options for Cost Effectiveness • Any device, Any App, Any Cloud Protect Application Infrastructure with Unmatched Speed and • Application Delivery Firewall Scalability – Improve App Resilience and reduce costs
  • 9. Cloud: Maximize resources, Ensure App availability Scale Up – Vertical Growth On – Demand Chassis 1 Performance On-Demand with modular blades for linear scalability with Plug-and-Grow technology Scale In – Device Virtualization Multi-Tenant Device Domains 2 Device virtualization provides large scale administrative and routing separation with shared operating system Virtualization – vCMP 3 Device virtualization with isolated operating system and resources Scale Out – Horizontal Clustering Consolidate, distribute, and scale Device Clustering application delivery services up, in, and out of the data center with ScaleN 4 Device Service Clustering provides scaling and configuration syncing for up to 32 devices, enabling true multi-site horizontal scaling Application Service Clustering 5 Application Service Clustering delivers sub-second system failover and comprehensive connection mirroring, resulting in a highly available cluster for up to 8 devices
  • 10. Flexible Virtual Environment and Cloud Deployment Options Unmatched flexibility across all major virtualization platforms. Performance 3Gbps Private Public Amazon AWS Citrix XenServer Microsoft Hyper-V KVM VMware vSphere
  • 11. Complexity of Security Webification of apps Device proliferation 95% of workers use at least 71% of internet experts predict one personal device for work. most people will do work via web or mobile by 2020. 130 million enterprises will use mobile apps by 2014 Evolving security threats Shifting perimeter 58% of all e-theft tied 80% of new apps will to activist groups. target the cloud. 81% of breaches 72% IT leaders have or will involved hacking move applications to the cloud.
  • 12. Customer Business Needs To scale To secure To simplify Scale for a work-anywhere / Security for applications and data Simplification of point solutions and SSL everywhere world. against sustained attacks. complex firewall configurations.
  • 13. Introducing F5’s Application Delivery Firewall (Advanced Firewall Manager) Aligning applications with firewall security One Platform ICSA-certified Application Application Access DDoS SSL DNS firewall Delivery Security Control Mitigation Inspection Security Controller EAL2+ EAL4+ (in process)
  • 14. New approach to security Secure access to applications and data from anywhere while protecting them wherever they reside Provide the best end-to-end security with Full-proxy DC firewall with #1 ADC, secure access and application security Simplify the network while maximizing security, scale and performance Take advantage of intelligent services platform Experience top-quality extensibility and flexibility
  • 15. Best in Class Performance Appliance NEW ScaleN Enabled BIG-IP Platforms Broadest hypervisor Cloud ready - unmatched Best in class platforms from support for advanced ADC flexibility with ScaleN entry level to the highest in private and public clouds performing ADC in the world BIG-IP VE BIG-IP 2000s BIG-IP 2200s BIG-IP 4200v BIG-IP 10200v VIPRION 4800 Up to 3Gbps 212K L7 RPS 425K L7 RPS 850k L7 RPS 2M L7 RPS 20M L7 RPS Purpose Built and Carrier Grade Reliability
  • 16. F5 in Application Delivery Highest scaling and performing firewall in the world Full-proxy firewall for best security Application Delivery Firewall Simplification of network through consolidation of network and security functions Broadest hypervisor support for advanced ADC in private and public clouds Cloud ready – unmatched flexibility with ScaleN New ScaleN Enabled BIG-IP Platforms Best in class platforms from entry level to the highest performing ADC in the world