Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.
  • 29 November 2012 10:20

F5 Gives Enterprises Superior Application Control with BIG-IP® Solutions for Amazon Web Services

F5’s new BIG-IP virtual solutions for Amazon Web Services (AWS) enable customers to extend their data centres to the cloud while keeping applications fast, secure, and available.

F5 Networks, Inc. (NASDAQ: FFIV), the global leader in Application Delivery Networking (ADN), today introduced a BIG-IP® virtual edition for AWS, which leverages F5’s complete portfolio of BIG-IP products for the AWS cloud. This announcement addresses organisations’ escalating demand to extend their data centre and applications to AWS, maintaining enterprise-class reliability, scale, security, and performance.

“Enterprise customers have come to rely on BIG-IP’s strategic awareness that provides important information on how applications, resources, and users interact in order to successfully deliver applications,” said Siva Mandalam, Director of Product Management and Product Marketing, Cloud and Virtualisation Solutions at F5. “Since BIG-IP for AWS will have equivalent features to physical BIG-IP devices, customers can apply the same level of control for their applications in AWS. With BIG-IP running in enterprise data centers and on AWS, customers can establish secure tunnels, burst to the cloud, and control the application from end to end.”

The BIG-IP solution for AWS includes options for traffic management, global server load balancing, application firewall, web application acceleration, and other advanced application delivery functions. With the new F5 offering:

F5 ADN services operate seamlessly in the cloud – BIG-IP virtual editions are being made available to a growing number of customers seeking to leverage cloud offerings. Availability for AWS expands on F5’s broad support for virtualised and cloud environments based on vSphere, Hyper-V, Xen, and KVM.

Enterprises can confidently take advantage of cloud resources – AWS customers can easily add F5’s market-leading availability, optimisation, and security services to support cloud and hybrid deployment models.

IT teams are able to easily scale application environments – Production and lab versions of BIG-IP virtual editions for AWS enable IT teams to move smoothly from testing and development into production to support essential business applications. Customers can leverage their existing BIG-IP configuration and policies and apply them to BIG-IP running on AWS.

Supporting Facts and Quotes

F5 has the greatest market share for the advanced application delivery controller (ADC) market, deployed within the enterprise and service providers markets. According to Gartner, Inc., F5 has 59.1% market share based on Q2 2012 worldwide revenue.1

F5’s initial product offering will use the AWS “bring your own license” (BYOL) model, which allows customers to buy perpetual licenses from F5 and then apply these licenses to instances running in AWS. To evaluate or purchase BIG-IP software modules, customers should contact their local F5 sales office.

“As enterprises consider which applications to move to the cloud, many customers have asked for the same advanced application control they have in their local data centers,” said Terry Wise, Head of Worldwide Partner Ecosystem at Amazon Web Services. “The BIG-IP solution for AWS enables enterprises to quickly move complex applications to AWS while maintaining high levels of service at a lower overall cost.”

“Enterprises want the flexibility and scale of cloud services, yet they can struggle with application complexity and sufficient control,” said Rohit Mehra, VP of Network Infrastructure at IDC. “The challenge lies in easily expanding IT’s service portfolio with cloud and hybrid capabilities while keeping the applications fast, secure, and available. BIG-IP’s native availability inside Amazon Web Services allows enterprises to deeply embed a strategic awareness of how applications behave in cloud adoption scenarios.”


BIG-IP solutions for AWS will be available for purchase by the end of calendar year 2012.

1 Gartner, Inc. “Market Share: Application Acceleration Equipment, Worldwide, 2Q12,” Joe Skorupa and Nhat Pham, Sept. 24, 2012

About F5 Networks

F5 Networks, Inc., the global leader in Application Delivery Networking (ADN), helps the world’s largest enterprises and service providers realize the full value of virtualization, cloud computing, and on-demand IT. F5® solutions help integrate disparate technologies to provide greater control of the infrastructure, improve application delivery and data management, and give users seamless, secure, and accelerated access to applications from their corporate desktops and smart devices. An open architectural framework enables F5 customers to apply business policies at “strategic points of control” across the IT infrastructure and into the public cloud. F5 products give customers the agility they need to align IT with changing business conditions, deploy scalable solutions on demand, and manage mobile access to data and services. Enterprises, service and cloud providers, and leading online companies worldwide rely on F5 to optimize their IT investments and drive business forward. For more information, go to

You can also follow @f5networks on Twitter or visit us on Facebook for more information about F5, its partners, and technology. For a complete listing of F5 community sites, please visit

F5, BIG-IP, and DevCentral are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.

This press release may contain forward looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC.

# # #

Submit a media release

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Media Release

More media release