Cenzic Partners with F5 Networks, Brings Enhanced Application Security to Market

By

Network and application security are gaining more attention in the broader business space, especially as more companies are turning to virtualization and cloud computing. Cenzic, a Web application security intelligence provider, is working to provide integrated application vulnerability identification and blocking to protect client environments. 

To accomplish this goal, Cenzic has joined forces with F5 Networks. The Cenzic Cloud will be integrated with the F5 BIG-IP Application Security Manager. The resulting solution is designed to ensure all vulnerabilities are identified and addressed via the F5 BIG-IP ASM policy.

Cenzic software integrates seamlessly with BIG-IP ASM and select cloud-based solutions, allowing for the automation of policy configuration and the provision of patch vulnerabilities. System scans are directly initiated from the ASM GUI, which also provides a complete display of all results, as well as the conversion of vulnerabilities that have been detected.

To delve deeper into Cenzic capabilities and their impact on the market, John Weinschenk, Cenzic president and CEO, was on hand at the TMC Executive Editorial Open House in San Jose this week. Weinschenk joined TMC’s Rich Tehrani in the newsroom to discuss his company's application security solutions. Check out the Roadshow video below.



As Web applications are the most vulnerable to attackers, Cenzic focused its development outside of simple signature detection to examine the behavioral model. The solution will identify weaknesses through the emulation of an attacker’s activity.

With the combination of BIG-IP ASM and application scanning, dynamic security in complete compliance is achieved.

"This solution collectively offers more than the sum of these two mature and highly useful components," said Weinschenk. "Users are now able to efficiently and quickly improve security for a large number of web sites while getting the most out of existing F5 BIG-IP devices and reducing ASM management costs."

 Customers and partners can apply the combined solution while enjoying an exclusive Cenzic offer: three scans of a website for free. With these scans, companies can ensure they are not only protected, but compliant without interrupting their business.

"Continuous vulnerability assessments, combined with our award-winning Web application firewall, BIG-IP Application Security Manager, go a long way to delivering a complete Web application security solution,” said Calvin Rowland, vice president of technology and ISV Alliances at F5 Networks. “By creating dynamic threat management solutions with technology leaders in the DAST market, F5 helps enterprises extend the value of their BIG-IP environments."

To learn more about Cenzic and what they are doing to offer complete protection of your online tools, check out the Roadshow video in full above.




Edited by Braden Becker

TechZone360 Contributing Editor

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More