Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore

Select a tab

What's popular

Practical API Security: Discover, Defend, and Secure APIs from Code to Runtime

This lab provides a hands-on introduction to API security and visibility using F5 Distributed Cloud Web App and API Protection (XC WAAP). As APIs continue to grow in number and complexity, they have become a primary target for cyberattacks. This lab explores how to discover, document, and secure both known and shadow APIs using the platform's API Discovery, Schema Validation, and Security Dashboards. Participants will learn how to: Send traffic through the F5 HTTPS Load Balancer to trigger API Discovery and the API Crawler Automatically generate and maintain an API inventory, including undocumented shadow APIs Apply OpenAPI Schema Validation to enforce API conformity and detect anomalies Gain deep insights through advanced API Security Dashboards, including threat levels, sensitive data exposure, authentication status, and risk scores Understand the importance of integrating DevSecOps practices by leveraging IaC and GitHub Actions for API protection deployment By the end of this lab, users will gain critical visibility into their API ecosystem, identify vulnerabilities, and take actionable steps to secure both documented and undocumented APIs—helping to bring shadow APIs into the light.
Advanced Configuration Lab
•5 launches

How to Secure Your Apps and APIs in the Cloud Without Compromising Speed

WWT + F5 can help you protect your organization while providing greater flexibility, agility, and scalability
Article
•Nov 2, 2023

Deploying and Securing Multi-Cloud and Edge Generative AI Workloads with F5 Distributed Cloud

In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments. However, distributed deployments come with challenges, including: Complexity in managing multi-cloud environments. Lack of unified visibility across clouds. Inconsistent security and policy enforcement. F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
11 launches

F5 Distributed Cloud WAF on Regional and App Connect Deployment Mode

F5 Distributed Cloud WAF deployed on Regional Edge and App Connect Deployment mode. This deployment model offers an optimal solution for scenarios where backend applications are inaccessible from the internet, lacking a Fully Qualified Domain Name (FQDN) or Public IP. In this case Customer Edge sites can be deployed to connect these "private" customer sites to the XC Global Network via IPSEC tunnels opened from Distributed Cloud Customer Edges to the closes two REs sites. Distributed Cloud WAF is deployed on the Regional Edges, where the services are being advertised to the Internet through anycast IPs. Customer Edges are being deployed on the customer sites and connect to the closest RE and traffic will be inspected by the WAAF security policy. The traffic will then be forwarded across the distributed cloud global network towards an egress Regional Edge and then over an IPSEC tunnel to the Customer edge site where it will be forwarded to the backend applications as pure IP-based traffic.
Advanced Configuration Lab
19 launches

F5 Distributed Cloud SaaS: WAAP (Web App and API Protection)

Explore the Web App & API Protection (WAAP) capabilities of F5 Distributed Cloud platform.
Article
•Aug 16, 2022

What's new

F5 Distributed Cloud WAF on Regional and App Connect Deployment Mode

F5 Distributed Cloud WAF deployed on Regional Edge and App Connect Deployment mode. This deployment model offers an optimal solution for scenarios where backend applications are inaccessible from the internet, lacking a Fully Qualified Domain Name (FQDN) or Public IP. In this case Customer Edge sites can be deployed to connect these "private" customer sites to the XC Global Network via IPSEC tunnels opened from Distributed Cloud Customer Edges to the closes two REs sites. Distributed Cloud WAF is deployed on the Regional Edges, where the services are being advertised to the Internet through anycast IPs. Customer Edges are being deployed on the customer sites and connect to the closest RE and traffic will be inspected by the WAAF security policy. The traffic will then be forwarded across the distributed cloud global network towards an egress Regional Edge and then over an IPSEC tunnel to the Customer edge site where it will be forwarded to the backend applications as pure IP-based traffic.
Advanced Configuration Lab
•19 launches

F5 Distributed Cloud (XC) Application Security with Terraform

In this lab, users will experience F5 Distributed Cloud Web App and API protection (WAAP), where organizations can simplify their path to effective security without sacrificing continued business innovation and customer demand. An API-driven approach to application protection enables improved collaboration between networks, security operations, and developers. This lab will use Terraform to deploy a Web App and API protection solution that protects an existing application
Advanced Configuration Lab
•25 launches

F5 Distributed Cloud WAF on Regional Deployment Mode

This WWT Lab will provide a hand on experience of F5 Distributed Cloud WAF deployed on Regional Edge in deployment mode. This deployment mode is better suited when protecting backend applications which are already public accessible from the internet via FQDN or Public IP. F5 Distributed Cloud WAF is deployed on the Regional Edges, where the services are being advertised to the internet through anycast IPs. The end users will connect to their closest Regional Edge and the traffic will be inspected by the WAF security policy. The traffic will then be forwarded across the XC Global Network towards an egress Regional Edge and then towards the customer site as regular internet traffic. The customer will filter the traffic, only allowing traffic forwarded by the XC platform.
Advanced Configuration Lab
•33 launches

Practical API Security: Discover, Defend, and Secure APIs from Code to Runtime

This lab provides a hands-on introduction to API security and visibility using F5 Distributed Cloud Web App and API Protection (XC WAAP). As APIs continue to grow in number and complexity, they have become a primary target for cyberattacks. This lab explores how to discover, document, and secure both known and shadow APIs using the platform's API Discovery, Schema Validation, and Security Dashboards. Participants will learn how to: Send traffic through the F5 HTTPS Load Balancer to trigger API Discovery and the API Crawler Automatically generate and maintain an API inventory, including undocumented shadow APIs Apply OpenAPI Schema Validation to enforce API conformity and detect anomalies Gain deep insights through advanced API Security Dashboards, including threat levels, sensitive data exposure, authentication status, and risk scores Understand the importance of integrating DevSecOps practices by leveraging IaC and GitHub Actions for API protection deployment By the end of this lab, users will gain critical visibility into their API ecosystem, identify vulnerabilities, and take actionable steps to secure both documented and undocumented APIs—helping to bring shadow APIs into the light.
Advanced Configuration Lab
•5 launches

Deploying and Securing Multi-Cloud and Edge Generative AI Workloads with F5 Distributed Cloud

In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments. However, distributed deployments come with challenges, including: Complexity in managing multi-cloud environments. Lack of unified visibility across clouds. Inconsistent security and policy enforcement. F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
•11 launches

Deploy Customer Edge Mode in F5 Distributed Cloud (XC) with Application Hosted on GCP

Welcome to the F5 Distributed Cloud (XC) with Customer Edge Deployment mode This lab, presented by WWT and powered by F5 vesctl command line tool, will guide you through aspects of managing configuration within GCP, Kubernetes using F5 Distributed Cloud (XC) in Customer Edge deployment mode. This hands-on experience guides you through deploying a multi-cloud application across GCP, which is accessible via Private IP through an F5 By harnessing the capabilities of the F5 HTTPS Load Balancer, routing traffic within GCP environments privately.
Advanced Configuration Lab
•18 launches

F5 XC Customer Edge Deployment Mode on AWS

Welcome to the F5 Distributed Cloud (XC) with Customer Edge Deployment mode This lab, presented by WWT and powered by F5 vesctl command line tool, will guide you through aspects of managing configuration within AWS, Kubernetes using F5 Distributed Cloud (XC) in Customer Edge deployment mode. This hands-on experience guides you through deploying a multi-cloud application across AWS, which is accessible via Private IP through an F5 By harnessing the capabilities of the F5 HTTPS Load Balancer, routing traffic within AWS environments privately.
Advanced Configuration Lab
•7 launches

Partner POV | Find Your Strategy to Overcome Multicloud Complexity

Simplify operations from procurement to management for secure and optimized apps with WWT, F5 and Google Cloud
Video
•1:08
•Jul 17, 2024

Partner POV | Data Plane Management for Modern Apps

Applications have changed, and so has the way we think about managing applications.
Partner Contribution
•Jul 8, 2024

F5 Distributed Cloud L7 DDoS Mitigation

Learn how to use F5 Distributed Cloud to protect your applications from DDoS attacks.
Blog
•Jun 13, 2024

F5 Distributed Cloud WAAP Use Cases Demo

Several of the fundamental principles of F5 Distributed Cloud (XC) are highlighted in this lab environment. You will be simulating a customer during the lab who needs to verify the safety of an application. The objective is to verify the applications safety of on-premises or application on cloud before and after enabling F5 Distributed Cloud Console WAAP Capabilities by sending attacks to the application.
Advanced Configuration Lab
•217 launches

F5 Distributed Cloud WAF on Customer Deployment Mode Azure

This deployment mode is ideal for protecting backend applications that require direct internet traffic with no intermediary processing, ensuring maximum security and privacy. It's also suitable for local traffic scenarios where all traffic originates and terminates within the same customer site. In this mode, XC WAF is configured on the Customer Edge (CE) devices deployed at the customer's premises. In this case Azure Kubernetes cluster acted as customer's premises. End-users connect directly to the CEs, bypassing the XC Global Network. Meanwhile, the CE sites remain managed through the XC Cloud-based console ensuring centralized control and visibility.
Advanced Configuration Lab
•39 launches

Partner POV | F5 + Red Hat + WWT: Powering the Cloud Partner Ecosystem

It's been said that the best collaborations create something bigger than what any one organization can achieve on its own. That's the sentiment that guides F5's approach to their entire partner ecosystem—including the collaboration with Red Hat, the world's leading provider of enterprise open source solutions.
Partner Contribution
•May 3, 2024

Modernizing Application Environments with WWT and F5

To enhance the healthcare delivery experience for both patients and clinicians, a prominent healthcare service provider turned to a cloud-native solution that scales seamlessly, improves application accessibility and availability, and exceeds rigorous security requirements.
Case Study

Programmability and Automation Meetup: F5 and VSCode: Supercharge your automation development

VS Code extensions provide capabilities to increase developer productivity and streamline the developer experience. In this session, presented by Ben Novak of F5, we explored all the great features of the vscode-f5 extension, how it streamlines automation workflow development, and looked under the hood at how it works.
Video
•58:11
•Jan 23, 2024

F5 & WWT Partnership

F5 and WWT's global partnership is founded on innovation, deep technical expertise, trust, and culture that drives positive business outcomes for our customers. F5 solutions help our customers with their most complex challenges around digital and security transformation and AI.
Video
•2:28
•Jan 22, 2024

How to Secure Your Apps and APIs in the Cloud Without Compromising Speed

WWT + F5 can help you protect your organization while providing greater flexibility, agility, and scalability
Article
•Nov 2, 2023

Partner POV | Deter Sophisticated eCommerce Fraud and Abuse with F5 Bot Defense

See how F5 entered the war room to battle skilled and motivated adversaries that attempted to compromise a large online retailer.
Video
•3:45
•Oct 23, 2023

Build Secure Multicloud Networking with F5

F5 Distributed Cloud Services provides a SaaS-based platform that delivers secure network and app service connectivity between multiple clouds, on-premises data centers, and edge locations.
Video
•1:32
•Oct 19, 2023

Securing the Cloud Frontier: Insights into F5's Distributed Cloud Solutions | Partner Spotlight

As security strategies continue to evolve and move toward hybrid models, the challenges, and complexities of multicloud infrastructures are becoming increasingly evident. IT and business leaders alike must navigate this terrain by offering innovative solutions that address both application delivery and security across diverse cloud architectures. This webinar will shed light on the industry trends and market dynamics that are shaping the need for advanced security solutions. F5 leaders — Kara Sprague, EVP and Chief Product Officer and Kevin Hollenbach, SVP of North America Sales — will share their insights into how the F5 comprehensive security portfolio addresses these challenges. Discover how the partnership between WWT and F5 can provide a holistic approach to secure connectivity and protection in the era of distributed, multicloud environments. Gain valuable insights into the unique features and capabilities that differentiate the F5 solutions from the competition.
Webinar
•Oct 12, 2023 • 9am

F5 Distributed Cloud

F5 Distributed Cloud services leverage a cloud-native environment to simplify app deployment, security, connectivity and operations.

24 Followers

At a glance

26Total
9Labs
6Videos
5Blogs
4Articles
1Case Study
1Event
What's related
  • F5
  • Security
  • Application & API Security
  • Cloud
  • Cloud Security
  • F5 Application Delivery Contollers
  • ATC
  • F5 Automation
  • Application Delivery Controllers
  • Networking
  • Blog
  • Cloud Networking
  • F5 Fraud Prevention
  • Data Center
  • Data Protection & Cyber Recovery
  • F5 Public Sector
  • NGINX
  • Network Security
  • AI & Data
  • AI Proving Ground

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies