Average Ratings 1 Rating
Average Ratings 0 Ratings
Description
In a world increasingly dominated by applications, advanced technology is essential for success. Your business thrives on apps, and BIG-IP application services ensure you have the availability, performance, and security necessary to satisfy your operational needs. With BIG-IP application delivery controllers, you can guarantee that your applications remain operational and efficient. The BIG-IP Local Traffic Manager (LTM) and BIG-IP DNS are designed to effectively manage your application traffic while safeguarding your infrastructure. You benefit from integrated security and traffic management services, as well as performance enhancements, regardless of whether your applications are hosted in a private data center or in the cloud. Moreover, solutions like BIG-IP Diameter Traffic Management, BIG-IP Policy Enforcement Manager (PEM), and BIG-IP Carrier-Grade NAT (CGNAT) oversee network resources to maintain peak performance for your applications, ensuring they meet carrier-grade standards. These tools also assist in discovering opportunities to optimize and monetize your network, ultimately leading to an improved financial outcome for your business. By leveraging these advanced services, you can fully unlock the potential of your applications, driving innovation and growth across your organization.
Description
Secure Traffic Manager is a smart platform designed to oversee network traffic and application performance in real-time, ensuring that service quality remains high. It delivers extensive visibility into network activity, enabling proactive management of customer connections by monitoring their health. With its unique "distress score," you can pinpoint users experiencing subpar service and resolve problems before they worsen. Additionally, it provides valuable insights into bandwidth usage across different applications, helping to identify distressed applications and uncover the causes of their performance issues. STM allows for sophisticated, real-time control over network traffic, targeting various levels such as applications, users, and network segments. By correlating data, you can ascertain whether issues are related to a specific customer, an application, or a network segment, while also accessing both real-time and historical data for each customer to anticipate and mitigate potential challenges effectively. This comprehensive approach not only enhances user experience but also optimizes overall network efficiency.
API Access
Has API
API Access
Has API
Integrations
AWS Marketplace
AuthPoint
Axonius
Blink
Checkmk
CloudCover CoverIT
Entrust TLS/SSL Certificates
F5 Distributed Cloud Client-Side Defense
Graylog
LoginTC
Integrations
AWS Marketplace
AuthPoint
Axonius
Blink
Checkmk
CloudCover CoverIT
Entrust TLS/SSL Certificates
F5 Distributed Cloud Client-Side Defense
Graylog
LoginTC
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
F5
Founded
1996
Country
United States
Website
www.f5.com/products/big-ip
Vendor Details
Company Name
FirstWave
Founded
2001
Country
Australia
Website
firstwave.com/products/secure-traffic-manager/
Product Features
Application Delivery Controllers (ADC)
CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)
Application Performance Monitoring (APM)
Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions
DDoS Protection
DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Product Features
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting