Overview
F5's Managed Rules for AWS WAF offer an additional layer of protection that can be easily applied to your AWS WAF. F5's Bot Protection rules analyze all incoming requests and block any malicious bot activities identified, including DDoS tools, vulnerability scanners, web scrapers, and forum spam tools. All rules are written, managed and regularly updated by F5's security specialists to ensure protection against evolving threats without the need for intervention on your part. The rules are licensed on a pay-as-you-go basis so you will only pay for what you use. Deployment guidance can be found at https://pages.awscloud.com/rs/112-TZM-766/images/F5_OWASP_Getting%20Started%20Guide.pdf .
Alternatively, if you require more sophisticated protection then F5's Advanced WAF or Shape Enterprise Defense may be more appropriate solutions. F5 Advanced WAF leverages behavioral analytics and machine learning to thwart complex app-layer attacks, while Shape Enterprise Defense offers market-leading bot protection capable of determining if requests originate from bots and whether they have malicious or benign intent. Learn more about F5 Advanced WAF (https://thinkwithwp.com/marketplace/pp/prodview-cs4qijwjf3ijs?sr=0-1&ref_=beagle&applicationId=AWSMPContessa ) or Shape Enterprise Defense (https://www.shapesecurity.com/shape-enterprise-defense ).
Highlights
- Easily Enhance Security - No security expertise needed, simply attach rules to your AWS WAF instances to immediately bolster protection.
- Continuously Updated - Rulesets are monitored, maintained and update by F5's security experts to ensure protection against evolving threats.
- Fast & Simple Deployment - Attach F5's WAF rules to your AWS WAF instance in a matter of minutes following three simple deployment steps.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Cost/unit |
---|---|
Charge per month in each available region (pro-rated by the hour) | $20.00 |
Charge per million requests in each available region | $1.20 |
Vendor refund policy
For this offering, F5 does not offer refund, you may cancel at anytime.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
F5 Rules for AWS WAF are supported via F5 DevCentral - F5's extensive community of experts, developers and users addressing technical issues related to F5 products. If you have any questions or need assistance with any aspect of F5's rulesets please submit a question with the tag 'F5 rules for AWS WAF' (http://devcentral.f5.com/s/questions?tag=F5+Rules+for+AWS+WAF ). Response times may be up to 2 days. For online information regarding F5 Rules for AWS WAF, please refer to https://support.f5.com/csp/article/K21015971 . For any infrastructure and WAF related questions please contact AWS Support (https://thinkwithwp.com/contact-us ) for AWS WAF related assistance.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Evaluating the Effectiveness of F5 BIG-IP Advanced WAF ln Enhancing Application Security
Configuring and managing the Advanced WAF requires a certain level of expertise, which could result in inefficiencies or misconfigurations if not properly addressed.
Best way to protect exposed applications
Industry leading solution for WAF
All in one feature set
It has iRule feature, where I can script my custom requirements where it does not support by default.
F5 - LTM , GTM , ASM , APM | Citrix ADC , Gateway, GSLB | AWS ELB
Application security has never been so efficient and easy to deploy/tune/operate/ with ASM module.
However, the real winner is the F5 team that consistently develops & ensures the module is up-to-date with recent ''fire"(s) of the world.
Backtracking the application level changes triggering ASM alarms and mitigating them.
Mitigating security vulnerabilties is the big one.