For more information regarding the security incident at F5, the actions we are taking to address it, and our ongoing efforts to protect our customers, click here.

Extend visibility - BIG-IP joins forces with CrowdStrike

Introduction

The traditional focus in cybersecurity has prioritized endpoints like laptops and mobiles with EDR, as they ​are key entry points for intrusions.​ Modern threats target the full network infrastructure, like routers, ADCs, firewalls, servers, VMs, and cloud instances, as interconnected endpoints.​

All network software is a potential target in today’s sprawling attack surface.​ Summarizing some of those blind points below, 

  • Servers, including hardware, VMs, and cloud instances: Often under-monitored, rapid spin-up creates ephemeral risks for exfiltration and lateral movement.​
  • Network appliances: Enable traffic redirection, data sniffing, or backdoors, ​
    if compromised.​
  • Application delivery components: Vulnerable to session hijacking, code injection, ​
    or DDoS, due to high-traffic processing.​

 

Falcon sensor integration 

In this section, we go through download and installation steps, and observe how the solution works with detecting/blocking malicious packages.

For more information, follow our KB articles, https://my.f5.com/manage/s/article/K000157015

 

Related content

Published Nov 19, 2025
Version 1.0
No CommentsBe the first to comment