F5 Distributed Cloud App Infrastructure Protection (AIP) Features
Management (2)
Dashboards and Reports
Access pre-built and custom reports and dashboards.
Administration Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Operations (2)
Logging and Reporting
Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security Controls (3)
Anomaly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Security Auditing
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Administration (6)
Security Auditing
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Configuration Management
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Auditing
Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
Security Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Security Integration
Integrates additional security tools to automate security and incident response processes.
Multicloud Visibility
Allows users to track and control activity across cloud services and providers.
Monitoring (3)
Continuous Image Assurance
Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats.
Behavior Monitoring
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Observability
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Protection (4)
Dynamic Image Scanning
Scans application and image source code for security flaws without executing it in a live environment
Runtime Protection
Monitors container activities and detects threats across containers, networks, and cloud service providers.
Workload Protection
Protects compute resources across a networks and cloud service providers. Serves as Firewall and prompts additional authentication for suspicious users.
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Security (6)
Compliance Monitoring
Monitors data quality and sends alerts based on violations or misuse.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
Risk Analysis
Identifies potential network security risks, vulnerabilities, and compliance impacts.
Reporting
Creates reports outlining log activity and relevant metrics.
Compliance (1)
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Activity Monitoring (2)
API Monitoring
Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Activity Monitoring
Actively monitors status of work stations either on-premise or remote.
Configuration (3)
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Unified Policy Management
Allows users to track and control security policies across cloud services and providers.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Vulnerability Management (4)
Threat Hunting
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Vulnerability Scanning
Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
Stores information related to new and common vulnerabilities and how to resolve them once incidents occur.
Risk-Prioritization
Allows for vulnerability ranking by customized risk and threat priorities.
Agentic AI - Cloud Security Monitoring and Analytics (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives





