SlideShare une entreprise Scribd logo
1  sur  45
Innovate, Expand, Deliver 
Innovate, Expand, Deliver 
Manny Rivelo 
EVP, Strategic Solutions 
Dmitry Tikhovich 
Channel Manager, Eastern Europe
APPLICATIONS 
WITHOUT CONSTRAINTS. 
F5 VISION
Full-proxy enables superior user-to-application experience 
End Users 
Applications
4 Software Defined Application Services 
3 Cloud Ready 
2 Broadened Application Services 
1 Application Delivery Controller 
4
F5 Synthesis Partner Ecosystem 
Network/SDN Cloud Security Orchestration Application 
Service Provider
Network/ 
SDN 
Application Policy 
Infrastructure 
Controller (APIC), 
UCS Director (UCSD) 
Intelligent Management 
System (IMC), 
VAN Resource 
Automation Manager 
Hyper-V 
System Center Virtual 
Machine Manager 
(SCVMM) 
NSX, 
vCenter Orchestrator 
(vCO) 
Cloud Intercloud Enterprise Cloud 
Services (ECS) 
Azure, 
Cloud Platform System 
(CPS) 
vCloud Air 
Other SourceFire Atalla, 
ArcSight, 
Tipping Point, 
WebInspect 
Office 365 vCloud Automation 
Center (vCAC), 
AirWatch, Horizon (VDI)
Cisco and F5 partnership
THE F5 
PLATFORM.
The F5 Platform 
Service Provider customer 
URL Filtering 
Policy Enforcement Manager 
CGNAT 
Advanced Firewall Manager 
Pre-Client 
FY2009 
$1M 
Traffic Mgmt 
FY2010 
Firewall iRules 
ScaleN 
Scale & Extend 
FY2013 
ScaleN 
VIPRION 
SDAS Evolution 
FY2014 
VIPRION 
VIPRION 
$600K 
Local Traffic Manager 
$1.5M
The F5 Platform 
Financial Services customer 
Pre-Client 
FY2012 
$10M 
ACE Replace 
FY2013 
Versafe 
Defense.net 
Advanced Firewall Manager 
Access Policy Manager / 
Secure Web Gateway 
BIG-IQ 
Application Acceleration 
Manager 
Application Security Manager 
Global Traffic Manager 
BIG-IQ 
Application Acceleration 
Manager 
Application Security Manager 
Global Traffic Manager 
SDAS Evolution Future 
FY2014 
Local Traffic Manager 
Local Traffic Manager 
Local Traffic Manager 
$14M
As of October 2013 
F5 
Citrix 
A10 Radware 
Riverbed 
Barracuda 
Kemp 
Array 
Fortinet 
Brocade 
Sangfor 
GARTNER 
MAGIC QUADRANT
F5 
Citrix 
Radware 
As of August 2014 
A10 
Riverbed 
Kemp 
Barracuda 
Array 
Piolink Sangfor 
GARTNER 
MAGIC QUADRANT
THE FUTURE.
PERCENT 
of organizations are 
running applications or 
experimenting with IaaS 
PERCENT PERCENT 
of enterprises have 
hybrid cloud strategies 
of technology purchases 
are now owned by the 
lines of business
Value of IT to the business 
IT contribution to strategy 
Customer satisfaction 
Innovative new ideas 
Availability 
Projects delivered on time 
IT cost controls 
Productivity improvement 
Business cost controls 
Revenue growth 
1. 
2. 
3. 
4. 
5. 
6. 
7. 
8. 
9. 
10. 
TOP 10 
CIO PRIORITIES 
Business Concerns 
IT Concerns
Private DC / 
Central Office 
Infrastructure Axis 
Software Defined / 
NFV IaaS PaaS SaaS 
On-premises Off-premises
Application 
Web Application Firewall 
SSL 
Traffic Management/SLB 
Firewall/DDoS 
Secure Web Gateway 
GSLB/DNS 
Single Sign-on 
User 
Application Services Axis
Application 
Data Center Cloud 
Converged Systems 
On-premises Off-premises 
As-a-Service 
User
Application 
Priorities 
On-premises Off-premises 
User 
Data Center 
• Expand core market share 
• Continue extending into adjacent 
markets (SP, Security) 
• Seamless support for Software 
Defined Architectures 
• Next generation programmability 
• Management, Orchestration, 
Reporting & Visibility
Expand Core Market Share 
49 
PERCENT 
21 
PERCENT 
Total ADC 
Market Share 
• Cisco ACE, CSS and GSS replacement program 
• Technology and platform refresh 
• Application and protocol fluency: SIP, FIX, HTTP 2.0, DNS, SSL, … 
• New competitive programs — Citrix and A10 
Virtual ADC 
Source: Dell’Oro 
#1 #1
Extend into Adjacent Markets 
Leveraging F5 Core leadership to unlock Security and Service Provider TAM 
SERVICE PROVIDER 
Traffic Mgmt 
& SSL 
Parental 
DNS CGNAT Controls 
Security 
URL Filtering Policy 
Enforcement 
Diameter 
Routing 
Network 
Firewall 
App DDoS TCP 
Optimization 
Network 
DDoS
Extend into Adjacent Markets 
Leveraging F5 Core leadership to unlock Security and Service Provider TAM 
SERVICE PROVIDER 
Traffic Mgmt 
& SSL 
SECURITY 
Network SSL 
Firewall 
Parental 
DNS CGNAT Controls 
Security 
URL Filtering Policy 
Enforcement 
Diameter 
Routing 
Network 
Firewall 
App DDoS TCP 
Optimization 
Network 
DDoS 
Web Fraud 
Protection 
Access 
Control 
Traffic 
Management 
Application 
Security 
DNS 
Security 
DDoS 
Protection 
IP Intelligence Secure Web 
Gateway
Extend into Adjacent Markets 
Leveraging F5 Core leadership to unlock Security and Service Provider TAM 
Web Fraud 
Protection 
Access 
Control 
Juniper 
Pulse SSL VPN 
opportunity 
GA 
F5 WebSafe & 
MobileSafe
Software Defined Architecture 
SW DEFINED / NFV 
SDN and SDAS integration: 
• ALU – Nuage 
• Cisco – ACI 
• HP – VAN 
• Microsoft – HNV 
• VMware – NSX 
VE Leadership: 
• Platform independence 
• Performance/scale 
• Breath of application 
services 
• Programmability
Volume Licensing Subscription 
Enabling customers to add ADC services to all applications 
Flexibly deployable on both private and public clouds 
…with Premium Support and software upgrades included 
…in 1 and 3-year subscription increments 
…all managed via BIG-IQ 
Private/Public 
Cloud 
Support
Next Generation Programmability — Node.js 
Capture today's iRules authors as well as tomorrow's full DevOps authors 
EXTENDING TO NODE.JS BIG-IP 
• Launching iRules Language 
Extension on BIG-IP 
• Bringing Node.js community 
to DevCentral 
• 18M+ Developers WW 
• 7M Developers using node.js 
• 100k+ Node.js packages 
Source: Developer Population & Demographic 
Study, 2013 - Evans Data Corp 
PROGRAMMABILITY LEADER 
• 80% of F5 customers 
deploying iRules 
• 32% of all virtual servers have 
an iRule attached 
• 166k DevCentral users 
• 82k users participating in 
DevCentral iRules community 
Source: iHealth 2014 Data 
Q3
Application 
Data Center Cloud 
On-premises Off-premises 
User
Application 
Priorities 
On-premises Off-premises 
User 
Cloud 
• Capture Tier-1 cloud providers 
• Joint demand creation programs 
• Service Creation
Cloud 
GARTNER 
MAGIC QUADRANT 
Amazon Web Services 
Microsoft 
As of May 2014 
CenturyLink 
CSC 
IBM (SoftLayer) 
Verizon (Terremark) 
Google 
Rackspace 
Virtustream 
Dimension Data VMware 
Fujirtsu 
HP 
Joyent 
GoGrid 
Amazon Web Services 
AT&T 
Dimension Data (OpSource) 
Google Cloud Platform 
HP ECS 
IBM Smart Cloud 
Microsoft Azure 
Rackspace/CenturyLink 
Verizon Cloud (Terremark) 
vCloud Air (VMware) 
In Program
Cloud 
GARTNER 
MAGIC QUADRANT 
Amazon Web Services 
Microsoft 
As of May 2014 
CenturyLink 
CSC 
IBM (SoftLayer) 
Verizon 
(Terremar 
k) 
Google 
Rackspace 
Virtustream 
Dimension Data VMware 
Fujirtsu 
HP 
Joyent 
GoGrid 
Amazon Web Services 
AT&T 
Dimension Data (OpSource) 
Google Cloud Platform 
HP ECS 
IBM Smart Cloud 
Microsoft Azure 
Rackspace/CenturyLink 
Verizon Cloud (Terremark) 
vCloud Air (VMware) 
In Program
Service Creation with VMware vCloud Air
Examples of Service Creation Opportunities 
Web Application Firewall 
as-a-Service 
Anti-DDoS 
as-a-Service 
Traffic Management/LB 
as-a-Service 
Application Acceleration 
as-a-Service
Application 
Data Center Cloud 
Converged Systems 
On-premises Off-premises 
User
Application 
Converged Systems 
Priorities 
On-premises Off-premises 
User 
Integrate and bundle Synthesis with: 
• FlexPod 
• HP CloudSystem 
• Microsoft Cloud Platform System 
• Vblock – VCE
Application 
Data Center Cloud 
Converged Systems 
On-premises Off-premises 
As-a-Service 
User
Application 
Priorities 
• Global expansion 
• Defense.net (anti-DDoS) 
• New offerings 
• Hybrid solutions 
On-premises Off-premises 
F5 Silverline 
User
F5 Silverline Subscription Services 
IP Intelligence 
Secure Web 
Gateway 
Defense.net 
Versafe 
Web 
Application 
Firewall 
Additional 
Services 
GA 
Q3
Application 
Data Center Cloud 
Converged Systems 
On-premises Off-premises 
As-a-Service 
User
Application 
On-premises Off-premises 
User 
As-a-Service 
Delivered on a subscription basis 
from the F5 cloud - F5 Silverline 
Data Center 
Via on-premise solutions 
Cloud 
Through marketplaces 
Converged Systems 
As a part of integrated 
ecosystem stacks
Application 
Hybrid Application 
Services 
On-premises Off-premises 
User
5 Hybrid Application Services 
4 Software Defined Application Services 
3 Cloud Ready 
2 Broadened Application Services 
1 Application Delivery Controller 
41
$10 Billion 
App Services 
$12 Billion 
FY2014 
Cloud 
As-a-Service 
Security 
Core Traffic Mgmt Mobility 
Hybrid Application 
Services
DELIVER. 
EXPAND. 
INNOVATE. 
Solutions for an application world.
Будьте в курсе событий, вступайте в нашу группу на 
LinkedIn!
F5 Networks - парадная дверь в облака

Contenu connexe

Tendances

Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
vfmindia
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
Peter Silva
 

Tendances (20)

F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
 
Best Practices Guide: Introducing Web Application Firewalls
Best Practices Guide: Introducing Web Application FirewallsBest Practices Guide: Introducing Web Application Firewalls
Best Practices Guide: Introducing Web Application Firewalls
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
 
F5 Cloud Solutions
F5 Cloud SolutionsF5 Cloud Solutions
F5 Cloud Solutions
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
 
Advanced Web Application Security with an Intelligent WAF
Advanced Web Application Security with an Intelligent WAFAdvanced Web Application Security with an Intelligent WAF
Advanced Web Application Security with an Intelligent WAF
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
 
Nginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lkNginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lk
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
VIPRION 2400 and vCMP
VIPRION 2400 and vCMPVIPRION 2400 and vCMP
VIPRION 2400 and vCMP
 
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
 
Virtualization / Cloud / SDN
Virtualization / Cloud / SDNVirtualization / Cloud / SDN
Virtualization / Cloud / SDN
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machine
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
Ottawa e-NFV Session
Ottawa e-NFV Session Ottawa e-NFV Session
Ottawa e-NFV Session
 
Multi Cloud Load balancing 101 and Hands-on Lab
Multi Cloud Load balancing 101 and Hands-on LabMulti Cloud Load balancing 101 and Hands-on Lab
Multi Cloud Load balancing 101 and Hands-on Lab
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 

Similaire à F5 Networks - парадная дверь в облака

F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
Patricio Campos
 
Spider & F5 Round Table - The Flexible Data Center
Spider & F5 Round Table - The Flexible Data CenterSpider & F5 Round Table - The Flexible Data Center
Spider & F5 Round Table - The Flexible Data Center
Tzoori Tamam
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud Strategy
Amit Gatenyo
 
Hyper-v Cloud
Hyper-v Cloud Hyper-v Cloud
Hyper-v Cloud
Wes Yanaga
 
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-ServiceSun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Callidus Software
 

Similaire à F5 Networks - парадная дверь в облака (20)

f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
Presentation v mware virtualization & cloud vision 2010
Presentation   v mware virtualization & cloud vision 2010Presentation   v mware virtualization & cloud vision 2010
Presentation v mware virtualization & cloud vision 2010
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDBMongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
 
Spider & F5 Round Table - The Flexible Data Center
Spider & F5 Round Table - The Flexible Data CenterSpider & F5 Round Table - The Flexible Data Center
Spider & F5 Round Table - The Flexible Data Center
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
2011.11.22 - Cloud Infrastructure Provider - 8ème Forum du Club Cloud des Par...
2011.11.22 - Cloud Infrastructure Provider - 8ème Forum du Club Cloud des Par...2011.11.22 - Cloud Infrastructure Provider - 8ème Forum du Club Cloud des Par...
2011.11.22 - Cloud Infrastructure Provider - 8ème Forum du Club Cloud des Par...
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud Strategy
 
Dev ops
Dev opsDev ops
Dev ops
 
Dell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 MinutesDell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 Minutes
 
Hyper-v Cloud
Hyper-v Cloud Hyper-v Cloud
Hyper-v Cloud
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
 
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
 
Cloud computing by Bhavesh
Cloud computing by BhaveshCloud computing by Bhavesh
Cloud computing by Bhavesh
 
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-ServiceSun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
 
Migration, Protection, and Availability with AWS
Migration, Protection, and Availability with AWSMigration, Protection, and Availability with AWS
Migration, Protection, and Availability with AWS
 

Plus de BAKOTECH

F5 labs 2018. Отчет по защите веб-приложений
F5 labs 2018. Отчет по защите веб-приложенийF5 labs 2018. Отчет по защите веб-приложений
F5 labs 2018. Отчет по защите веб-приложений
BAKOTECH
 

Plus de BAKOTECH (20)

SOAR
SOARSOAR
SOAR
 
Upd pci compliance
Upd pci compliance Upd pci compliance
Upd pci compliance
 
Threat Detection & Response
Threat Detection & ResponseThreat Detection & Response
Threat Detection & Response
 
WatchGuard SD-WAN
WatchGuard SD-WAN WatchGuard SD-WAN
WatchGuard SD-WAN
 
WatchGuard WIPS
WatchGuard WIPSWatchGuard WIPS
WatchGuard WIPS
 
WatchGuard Authpoint
WatchGuard Authpoint WatchGuard Authpoint
WatchGuard Authpoint
 
McAfee Labs Threats Report, August 2019
McAfee Labs Threats Report, August 2019 McAfee Labs Threats Report, August 2019
McAfee Labs Threats Report, August 2019
 
F5 labs 2018. Отчет по защите веб-приложений
F5 labs 2018. Отчет по защите веб-приложенийF5 labs 2018. Отчет по защите веб-приложений
F5 labs 2018. Отчет по защите веб-приложений
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security Report
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от Ixia
 
Cloud Visibility for Dummies от IXIA
Cloud Visibility for Dummies от IXIACloud Visibility for Dummies от IXIA
Cloud Visibility for Dummies от IXIA
 
Network Visibility for Dummies
Network Visibility for DummiesNetwork Visibility for Dummies
Network Visibility for Dummies
 
SIEM for Beginners
SIEM for BeginnersSIEM for Beginners
SIEM for Beginners
 
SIEM для чайников
SIEM для чайниковSIEM для чайников
SIEM для чайников
 
Обеспечение безопасности активов современного бизнеса с помощью криптографии
Обеспечение безопасности активов современного бизнеса с помощью криптографии Обеспечение безопасности активов современного бизнеса с помощью криптографии
Обеспечение безопасности активов современного бизнеса с помощью криптографии
 
Надежная защита от утечек информации в условиях современных тенденций ИТ
Надежная защита от утечек информации в условиях современных тенденций ИТНадежная защита от утечек информации в условиях современных тенденций ИТ
Надежная защита от утечек информации в условиях современных тенденций ИТ
 
Проблематика безопасности баз данных. Выявление уязвимостей, контроль транзак...
Проблематика безопасности баз данных. Выявление уязвимостей, контроль транзак...Проблематика безопасности баз данных. Выявление уязвимостей, контроль транзак...
Проблематика безопасности баз данных. Выявление уязвимостей, контроль транзак...
 
Внутренняя угроза: выявление и защита с помощью ObserveIT
Внутренняя угроза: выявление и защита с помощью ObserveITВнутренняя угроза: выявление и защита с помощью ObserveIT
Внутренняя угроза: выявление и защита с помощью ObserveIT
 
Обзор инструментов Toad для администраторов Oracle
Обзор инструментов Toad для администраторов OracleОбзор инструментов Toad для администраторов Oracle
Обзор инструментов Toad для администраторов Oracle
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

F5 Networks - парадная дверь в облака

  • 1. Innovate, Expand, Deliver Innovate, Expand, Deliver Manny Rivelo EVP, Strategic Solutions Dmitry Tikhovich Channel Manager, Eastern Europe
  • 3. Full-proxy enables superior user-to-application experience End Users Applications
  • 4. 4 Software Defined Application Services 3 Cloud Ready 2 Broadened Application Services 1 Application Delivery Controller 4
  • 5. F5 Synthesis Partner Ecosystem Network/SDN Cloud Security Orchestration Application Service Provider
  • 6. Network/ SDN Application Policy Infrastructure Controller (APIC), UCS Director (UCSD) Intelligent Management System (IMC), VAN Resource Automation Manager Hyper-V System Center Virtual Machine Manager (SCVMM) NSX, vCenter Orchestrator (vCO) Cloud Intercloud Enterprise Cloud Services (ECS) Azure, Cloud Platform System (CPS) vCloud Air Other SourceFire Atalla, ArcSight, Tipping Point, WebInspect Office 365 vCloud Automation Center (vCAC), AirWatch, Horizon (VDI)
  • 7. Cisco and F5 partnership
  • 9. The F5 Platform Service Provider customer URL Filtering Policy Enforcement Manager CGNAT Advanced Firewall Manager Pre-Client FY2009 $1M Traffic Mgmt FY2010 Firewall iRules ScaleN Scale & Extend FY2013 ScaleN VIPRION SDAS Evolution FY2014 VIPRION VIPRION $600K Local Traffic Manager $1.5M
  • 10. The F5 Platform Financial Services customer Pre-Client FY2012 $10M ACE Replace FY2013 Versafe Defense.net Advanced Firewall Manager Access Policy Manager / Secure Web Gateway BIG-IQ Application Acceleration Manager Application Security Manager Global Traffic Manager BIG-IQ Application Acceleration Manager Application Security Manager Global Traffic Manager SDAS Evolution Future FY2014 Local Traffic Manager Local Traffic Manager Local Traffic Manager $14M
  • 11. As of October 2013 F5 Citrix A10 Radware Riverbed Barracuda Kemp Array Fortinet Brocade Sangfor GARTNER MAGIC QUADRANT
  • 12. F5 Citrix Radware As of August 2014 A10 Riverbed Kemp Barracuda Array Piolink Sangfor GARTNER MAGIC QUADRANT
  • 14. PERCENT of organizations are running applications or experimenting with IaaS PERCENT PERCENT of enterprises have hybrid cloud strategies of technology purchases are now owned by the lines of business
  • 15. Value of IT to the business IT contribution to strategy Customer satisfaction Innovative new ideas Availability Projects delivered on time IT cost controls Productivity improvement Business cost controls Revenue growth 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. TOP 10 CIO PRIORITIES Business Concerns IT Concerns
  • 16. Private DC / Central Office Infrastructure Axis Software Defined / NFV IaaS PaaS SaaS On-premises Off-premises
  • 17. Application Web Application Firewall SSL Traffic Management/SLB Firewall/DDoS Secure Web Gateway GSLB/DNS Single Sign-on User Application Services Axis
  • 18. Application Data Center Cloud Converged Systems On-premises Off-premises As-a-Service User
  • 19. Application Priorities On-premises Off-premises User Data Center • Expand core market share • Continue extending into adjacent markets (SP, Security) • Seamless support for Software Defined Architectures • Next generation programmability • Management, Orchestration, Reporting & Visibility
  • 20. Expand Core Market Share 49 PERCENT 21 PERCENT Total ADC Market Share • Cisco ACE, CSS and GSS replacement program • Technology and platform refresh • Application and protocol fluency: SIP, FIX, HTTP 2.0, DNS, SSL, … • New competitive programs — Citrix and A10 Virtual ADC Source: Dell’Oro #1 #1
  • 21. Extend into Adjacent Markets Leveraging F5 Core leadership to unlock Security and Service Provider TAM SERVICE PROVIDER Traffic Mgmt & SSL Parental DNS CGNAT Controls Security URL Filtering Policy Enforcement Diameter Routing Network Firewall App DDoS TCP Optimization Network DDoS
  • 22. Extend into Adjacent Markets Leveraging F5 Core leadership to unlock Security and Service Provider TAM SERVICE PROVIDER Traffic Mgmt & SSL SECURITY Network SSL Firewall Parental DNS CGNAT Controls Security URL Filtering Policy Enforcement Diameter Routing Network Firewall App DDoS TCP Optimization Network DDoS Web Fraud Protection Access Control Traffic Management Application Security DNS Security DDoS Protection IP Intelligence Secure Web Gateway
  • 23. Extend into Adjacent Markets Leveraging F5 Core leadership to unlock Security and Service Provider TAM Web Fraud Protection Access Control Juniper Pulse SSL VPN opportunity GA F5 WebSafe & MobileSafe
  • 24. Software Defined Architecture SW DEFINED / NFV SDN and SDAS integration: • ALU – Nuage • Cisco – ACI • HP – VAN • Microsoft – HNV • VMware – NSX VE Leadership: • Platform independence • Performance/scale • Breath of application services • Programmability
  • 25. Volume Licensing Subscription Enabling customers to add ADC services to all applications Flexibly deployable on both private and public clouds …with Premium Support and software upgrades included …in 1 and 3-year subscription increments …all managed via BIG-IQ Private/Public Cloud Support
  • 26. Next Generation Programmability — Node.js Capture today's iRules authors as well as tomorrow's full DevOps authors EXTENDING TO NODE.JS BIG-IP • Launching iRules Language Extension on BIG-IP • Bringing Node.js community to DevCentral • 18M+ Developers WW • 7M Developers using node.js • 100k+ Node.js packages Source: Developer Population & Demographic Study, 2013 - Evans Data Corp PROGRAMMABILITY LEADER • 80% of F5 customers deploying iRules • 32% of all virtual servers have an iRule attached • 166k DevCentral users • 82k users participating in DevCentral iRules community Source: iHealth 2014 Data Q3
  • 27. Application Data Center Cloud On-premises Off-premises User
  • 28. Application Priorities On-premises Off-premises User Cloud • Capture Tier-1 cloud providers • Joint demand creation programs • Service Creation
  • 29. Cloud GARTNER MAGIC QUADRANT Amazon Web Services Microsoft As of May 2014 CenturyLink CSC IBM (SoftLayer) Verizon (Terremark) Google Rackspace Virtustream Dimension Data VMware Fujirtsu HP Joyent GoGrid Amazon Web Services AT&T Dimension Data (OpSource) Google Cloud Platform HP ECS IBM Smart Cloud Microsoft Azure Rackspace/CenturyLink Verizon Cloud (Terremark) vCloud Air (VMware) In Program
  • 30. Cloud GARTNER MAGIC QUADRANT Amazon Web Services Microsoft As of May 2014 CenturyLink CSC IBM (SoftLayer) Verizon (Terremar k) Google Rackspace Virtustream Dimension Data VMware Fujirtsu HP Joyent GoGrid Amazon Web Services AT&T Dimension Data (OpSource) Google Cloud Platform HP ECS IBM Smart Cloud Microsoft Azure Rackspace/CenturyLink Verizon Cloud (Terremark) vCloud Air (VMware) In Program
  • 31. Service Creation with VMware vCloud Air
  • 32. Examples of Service Creation Opportunities Web Application Firewall as-a-Service Anti-DDoS as-a-Service Traffic Management/LB as-a-Service Application Acceleration as-a-Service
  • 33. Application Data Center Cloud Converged Systems On-premises Off-premises User
  • 34. Application Converged Systems Priorities On-premises Off-premises User Integrate and bundle Synthesis with: • FlexPod • HP CloudSystem • Microsoft Cloud Platform System • Vblock – VCE
  • 35. Application Data Center Cloud Converged Systems On-premises Off-premises As-a-Service User
  • 36. Application Priorities • Global expansion • Defense.net (anti-DDoS) • New offerings • Hybrid solutions On-premises Off-premises F5 Silverline User
  • 37. F5 Silverline Subscription Services IP Intelligence Secure Web Gateway Defense.net Versafe Web Application Firewall Additional Services GA Q3
  • 38. Application Data Center Cloud Converged Systems On-premises Off-premises As-a-Service User
  • 39. Application On-premises Off-premises User As-a-Service Delivered on a subscription basis from the F5 cloud - F5 Silverline Data Center Via on-premise solutions Cloud Through marketplaces Converged Systems As a part of integrated ecosystem stacks
  • 40. Application Hybrid Application Services On-premises Off-premises User
  • 41. 5 Hybrid Application Services 4 Software Defined Application Services 3 Cloud Ready 2 Broadened Application Services 1 Application Delivery Controller 41
  • 42. $10 Billion App Services $12 Billion FY2014 Cloud As-a-Service Security Core Traffic Mgmt Mobility Hybrid Application Services
  • 43. DELIVER. EXPAND. INNOVATE. Solutions for an application world.
  • 44. Будьте в курсе событий, вступайте в нашу группу на LinkedIn!

Notes de l'éditeur

  1. INNOVATE: “Innovate and be recognized as a thought leader. MQ eight years in a rolw Introduce next-generation ADC architecture for hybrid clouds and software defined datacenters Launch a disruptive suite of hybrid application security services” EXPAND: Expand our business models – subscription licensing, cloud services  and Silverline service delivery Expand our strategic partnerships with SDN and cloud technology leaders Expand our platform reach into new customer accounts and continue driving core share gains and acceleration into technology adjacencies (Security, SP Solutions and Cloud) Over 300 product features this year alone   DELIVER: financial results and customer satisfaction
  2. Talk to FAST, SECURE and AVAILABLE
  3. Launched November 2113
  4. Talk about Go-to-Market momemtun Cisco: Cisco Live: Milan, Melbourne & San Diego RA’s: ACI, VBlock certification Global webinar series Cisco ACI roadshows MSFT: TBD Vmware: RAs: Horizon View (VDI), NSX Vmworld Partner Exchange vForums, Vmware User Groups VMware Safe Passage NSX Lighthouse Program HP: HP Discover HP Global Partner Conference HP Technology Consulting Services HP Enterprise Services HP Enterprise Security Services
  5. Account manager :Craig Ashwood SP in Australia – Kishore Putnam originally Traffic Mgmt, then they bought consolidation of services story – SDAS and added PEM and traffic steering. Point out ScaleN is really about additional scale up and blades – performance reasons Point out iRules (extensibility) to AFM module
  6. Account Manager: Brian Gilbert Call out BIG-IQ’s future importance in the solution. Bottom line the message I worked with Scott is 3 fold: 1)      If ACE replace was the only work we did this year we would have dropped from almost $13MM to 4.6 MM 2)      The architecture sale of Synthesis and utilization of ASM, AAM, LTM and GTM enabled us to penetrate new JPMC Architectures which pulled through tons of business however the module penetration was not big yet. 3)      We missed on the slide the importance of Big IQ which was just purchased but without the Big Interaction all year via early adopter and JPMC belief we would execute we would have never gotten where we are, and , in future graphic Big IQ need to be the base of all accelerated security Revenue. All that said I do not have a breakout by module as much of the critical pieces were purchased as BEST. Will work to get that but it will not be that big numbers.  Reason is, in new DC’s they will buy 2 Viprions w Best that will pull then 10 LTM 10200’s . Next year we should see acceleration based on Big IQ functions required to compete in operating the security environment.
  7. Key point: Synthesis and everything we’ve done over the past year is having an impact…a very positive one.
  8. Leader for 8 consecutive years. Look at the change in the market and key players.
  9. 18% CAGR in Public Cloud adoption reaching $136 Billion in 2016
  10. Source is "35th Annual SIM IT Trends Study," which was announced by The Society for Information Management. Written up on CIOinsight.com
  11. Emphasize the central office component and NFV for SP customers
  12. BIG-IQ and Application Visibility Reporting Launching BIG-IQ ADC providing ADC Management foundation - device lifecycle mngmt - LTM/GTM object management at scale - full throttle RBAC BIG-IQ is brining all different IT team (net, sec, apps) in the same room (IT silos collaborating) and forcing a conversation about Applications and Architecture
  13. Total ADC Market Share is up 3.5 pts and vADC 6 pts Y/Y in 2014 Q3 results from Dell-Oro Cisco ACE, CSS and GSS Replacement Program — Total opportunity size = $1.6B Our “fair share” of 50% = $800M Captured so far: Americas $117M + RoW ~$100M (estimated) ~= $220M We have another $600M opportunity ripe for picking at current market share. Technology refresh: move from 1G to 10 G (server) and 10G to 40G (network) Platform refresh: new platform variants for NEBS, FIPS, SSD, SSL performance leadership, etc App and protocol fluency: Improve performance by 50% with the only HTTP 2.0 Gateway and new TCP Express SSL leadership with 1st SSL Crypto offload and connection mirroring capabilities Broadest application fluency including FIX and SIP Replicate DNS services in hybrid cloud environments Block access to malicious IPs with open service selection Optimized DNS resolving for most productive web browsing Industry leading Hyperscale DNS responses up to 200x for DDoS mitigation
  14. Security wins for Q4FY14: 1.      SMART, Philippines (Gi FW + PEM) a.      Problem: Parental control to meet Government regulations recently. Here is Philippines govt., regulation b.      We replaced Juniper SRX for Gi FW at SMART, and then used PEM for doing URL filtering for parent control 2.      Sprint a.      As of today, we are approved as a Gi FW vendor (Juniper used to be Gi FW Vendor) 3.      NTT DoCoMo – DDOS win; we beat A10 here 4.      Axiata, Malaysia, Gi FW 5.      AT&T virtual FW (we had POC in Q4 and potential $2M product bookings next week (in Q1FY15) as a part of their connected car (NFV) project   Gi Consolidation:   1.      We have also seen increased momentum for Gi consolidation. Here are the customer wins in FY14 for consolidation and POCs in Q1FY15 FY14: a.      FOXTEL b.      SMART c.      2Degrees d.      Hutch e.      Optus 2.      FY15 for consolidation POCs/engagement in Q1FY15: a.      Sprint (PEM + Gi FW) b.      KDDI Gi consolidation c.      Orange VASCO d.      Japan communications (MVNO) – PEM+LTM+CGNAT   Service Provider: 200X highest DNS scale Highest scale data plane Most comprehensive anti-DDoS Security: 100% transparent fraud solution Strongest zero-day protection Always-on bot defense Most comprehensive anti-DDoS 10X most scalable access
  15. Service Provider: 200X highest DNS scale Highest scale data plane Most comprehensive anti-DDoS Security: 100% transparent fraud solution Strongest zero-day protection Always-on bot defense Most comprehensive anti-DDoS 10X most scalable access
  16. VE market is $200 million today, growing to $800 million in 2019
  17. Four sizes to choose from: 100, 200, 400, and 1,000 VE’s And Good, Better, Best within each of those
  18. NPM just passed 100,000 modules
  19. 1.    We have complete coverage of the Gartner MQ. Most are already customers/partners. Our strategy includes  evolving those relationships to include cloud service creation, more diversified business models and demand creation. Beyond the MQ we have a Global coordinated effort to recruit the industries top MSP/Cloud providers including Traditional DataCenter MSP’s, Telco’s who are evolving to offer Cloud-based services as well as born in the cloud emerging companies. Headcount has been the major investment item here. 2.    Service creation. We already have a fairly extensive portfolio of partner-built service offerings around f5. LBaaS, GLBaaS, Application Acceleration, WAF. The next frontier is to evolve that to a Utility-based format in a repeatable fashion to that we can expose that catalog to all providers and help them to choose which services best fit their business. Again, do we talk to F5aaS? 3.    We are starting to make Marketing investments in FY ’15 really for the first time to drive demand to the Cloud providers who are building F5aaS offerings. Our strategy is to take a Programmatic approach that give the Provider exposure through our sales and channel to our customers so customer have a clear sight –line to which Providers are offering F5-based services. 4.    We are committed to making sure the F5 field and channel are compensated, educated and enabled to drive business to the cloud, regardless of model (utility, private, BYOL, Hybrid)  In FY ’15 we are launching new compensation guidelines and channel Programs to this effect. 100/100 for MSP and Private Cloud on a WW basis as well as paying both the Cloud team and end user team on metered billing. (For AIM, this should suffice, for ISC we can provide the details if that is appropriate for your pitch). 5.    Heavy investments in the back office to support metered business. We are looking at ways to engage Distribution here from an operational standpoint (billing, reporting, aggregation).
  20. Disaster Recovery Service Creation – F5 GTM and VMware vCloudAir
  21. 33 DDoS attacks over 100Gbps so far in 2014 Posted on 08 October 2014. Arbor Networks released global DDoS attack data for Q3 2014
  22. IPI: Associates known bad actors with IP addresses Known phishing sites, DDoS, botnets, scanners, etc. SWG: URL categorization and filtering Real-time content classification Anti-malware Defense.net Cloud-based DDoS mitigation service Break-down of multi-layer attacks for most efficient mitigation
  23. Lead in: Software Defined Application Services Delivered via:
  24. With our ADC, Security, Cloud and Mobility focus we’re expanding our market significantly and will be building upon this addressable market in the coming years. You’ll see us increase our application Services fabric performance Increase our catalog of application services Deliver on a single pane of glass vision While enabling our customer with new and simplified business models.
  25. Deliver : 2015 financial results, product quality and delight our customers Expand: Capitalize on our expanded TAM: Security SP Solutions Cloud Servcies and Silverline service delivery Strategic partnerships w/ SDN, Application, Cloud, etc business model innovation – GBB, VLS and Subscription licensing Innovate: continue to drive thought and product leadership across all we do, driving Hybrid Application Services for the next decade