Description
Zero trust app access
Deploy zero-trust model validation based on granular context, securing every app access request.
- Identity-Aware Proxy - Secure access to apps with a fine-grained approach to user authentication and authorization that enables only per-request context- and identity-aware access.
- Single Sign-On (SSO) and Access Federation - Integrating with existing SSO and identity federation solutions, users can access all their business apps via a single login, regardless of if the app is SAML enabled or not.
- OAuth 2.0 and OIDC Support - Enable social login to simplify access authorization from trusted third-party identity providers like Google, LinkedIn, Okta, Azure AD, and others.
Robust endpoint security
Perform device security and integrity checks and deliver per-app VPN access without user intervention.
- F5 Access Guard - A browser-based extension coordinates with APM to deliver continuous, ongoing device posture checks.
- Step-up Authentication - Request additional forms of authentication—e.g., multi-factor authentication (MFA)—if the user’s device location or sensitive nature of app data warrant further analysis.
- Mobile Device Management Integration - Integrate with leading MDM and enterprise mobility management (EMM) solutions, including VMware Horizon ONE (AirWatch), Microsoft Intune, and IBM MaaS360
Secure remote access
Gain end-to-end data encryption with highly customized authentication and access control to individual apps, networks, and resources.
- Per-App VPN - Enable granular control over corporate network access by ensuring data transmitted by managed apps travels only through a separate VPN tunnel.
- Visual Policy Editor (VPE) - The advanced graphical interface makes designing and managing granular access control policies on an individual or group basis fast and simple.
- Access Guided Configuration - Leverage a single and easy-to-use interface to onboard your legacy apps, as well as deploy Azure AD Conditional Access policies.
Hybrid app access
Integrating with IDaaS providers like Azure AD, you can centralize authentication to all your apps—cloud-native, SaaS apps and those on-prem.
- Identity-Aware Proxy - Secure access to apps with a fine-grained approach to user authentication and authorization. IAP enables only per-request context-and identity-aware access.
- Azure AD Conditional Access Integration - Easily deploy Conditional Access policies leveraging BIG-IP APM’s Access Guided Configuration (AGC).
- Integration with Third-Party Risk Assessment Engines - Leverage third-party UEBA and risk engines via REST APIs to inform policy-based access controls using the API Connector for more layered security