Who is it suitable for?
As the number of web applications continues to soar, an increasing amount of sensitive data is at risk of theft, vulnerability or other attacks. With BIG-IP ASM and AWAF, you can protect yourself from the OWASP top 10 threats, DDoS and botnet attacks, and plenty of other attack vectors.
Benefits
Flexible
Your requirements can also be covered thanks to BIG-IP ASM’s and AWAF’s comprehensive functions and the fact that the product can be extended by programming iRules.
Rapid deployments
For when speed is of the essence. Rapid deployment allows you to integrate the most common application security features into your website within an extremely short space of time.
Scalable
Whether you’re looking to protect just one website or 100, and whether it’s in the cloud or on-premises, we’ll find the perfect product to meet your needs.
Range of functions
With BIG-IP ASM and AWAF, you can protect your online presence and applications against a fair few threats. The range of functions includes:
OWASP top 10 threats and compliance with the PCI Standard
F5 protects against the OWASP top 10 threats and shows how compliant your security policy is against these 10 attack vectors. Reports can be prepared in ASM to show the compliance status with the PCI Standard.
Templates for applications
The ASM policy templates include a comprehensive range of templates that can be quickly and easily configured for the likes of:
- API Security
- WordPress
- Microsoft OWA and SharePoint
- SAP NetWeaver
Over 5,000 attack signatures
Common attacks such as SQL injection, path traversal, binary execution and many more are blocked with over 5,000 attack signatures.
iRules
iRules allows you to extend the F5’s range of functions to include programmable scripts. For all requirements that cannot be met by the ASM and AWAF standard functionalities, we are happy to check whether they can be implemented using iRules.
Visibility and incident correlation
Event logs and reports make tracking and noticing illegal activity an absolute breeze.
Other intrusion protection mechanisms
- Layer 7 DDoS (L3–L7 with F5 Silverline)
- Session hijacking
- Cookie manipulation
- Bot defence
A complete list of ASM and AWAF functionalities can be found in the product sheet.

Vendors & Certifications
Pioneering products and solutions from the world’s leading vendors


F5 Networks
F5 Networks established its reputation through its leading load balancer technology. Today F5 Networks’ BIG-IP platform offers various options to increase the trustworthiness and availability of applications. These include the global BIG-IP DNS load balancing solution for location-based acceleration and protection of IP DNS access, the intelligent application load balancer Local Traffic Manager (LTM), the web application firewall Application Security Manager (ASM), the ‘zero click’ remote access solution Application Access Policy Manager (APM) and WebSafe for access to web applications from non-trusted endpoints.
We also provide
The following services might also be of interest to you