F5’s Big-IP application delivery controllers are now certified as network firewalls, meaning they can replace separate network firewalls businesses might already have in place to meet regulators’ requirements.With one less device to manage and maintain, businesses can effectively streamline their data center defenses while optimizing traffic to servers.MORE: F5 BIG-IP upgrade improves IP services, battles DDOS attacksA F5 has been adding security features to its Big-IP platform for years, but only after release of its Big-IP 11.1 software was it able to pass ICSA Labs certification for network firewalls due to the addition of certain login methods and reporting capabilities, the company says. While it can do SSL termination, protocol security and DDoS protection, Big-IP is better known for its application delivery capabilities.Some network regulations imposed by government agencies and industry associations specify that businesses use network firewalls in order to comply. Read more about wide area network in Network World’s Wide Area Network section. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe