Subject Matter Expert, Remote Delivery, Contiguous Week, Normal Business Hours, No Statement of Work, Client directed utilization of time. Used to help clients get started with their new technologies. Expires 180 calendar days from purchase. Invoiced at the time of purchase. Subject to the Optiv SME Services Terms and Conditions found at Optiv.com/agreements
Overview
Optiv’s comprehensive portfolio of security operations services and solutions are designed to help you maximize your F5 Networks technology investment. We provide the expertise, experience and resources required to support and manage your F5 Networks application services and technology solutions.
Highlights
- PROVEN METHODOLOGIES • Focus on Business Outcomes • Solve for Complex Security Challenges • Break Down Technology Silos • Optiv Best in Class Services
- EXTENSION OF RESOURCES Optiv MSS has multiple security operations centers running 24x7x365 and 200+ experts, analysts, and security engineers responding to alerts to provide a wide range of continuous support that is best in class to clients.
- TECHNOLOGY RATIONALIZATION Not sure what’s needed? Optiv’s complimentary Security Program Foundation Assessment (SPFA) takes an inventory of existing solutions to determine gaps in security coverage and provides recommended course of action.
Details
Pricing
Custom pricing options
Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.
Legal
Content disclaimer
Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.
Resources
Vendor resources
Support
Vendor support
Software associated with this service
F5 Rules for AWS WAF - API Security Rules
By F5, Inc.
Protects against API attacks, web attacks (such as XML external entity attacks) and server side request forgery. The rule set includes support for XML and JSON payloads, and common web API frameworks.
F5 Rules for AWS WAF - Bot Protection Rules
By F5, Inc.
Protect against automated attacks. Bot Protections Rules is a partner managed rule group for AWS WAF that stops a broad range of malicious bots activities such as vulnerability scanners, web scrapers, DDoS tools, and forum spam tools.
Protect against web exploits. F5 Web Exploits Rules for AWS WAF, provides protection against web attacks that are part of the OWASP Top 10, such as: SQLi, XSS, command injection, No-SQLi injection, path traversal, and predictable resource.
Protect against common vulnerabilities and exposures (CVE). CVE Rules for AWS WAF provides protection for high profile CVEs targeting the following systems: Apache, Apache Struts, Bash, Elasticsearch, IIS, JBoss, JSP, Java, Joomla, MySQL, Node.js, PHP, PHPMyAdmin, Perl, Ruby On Rails, and WordPress.