This case study is about a Canadian real estate developer and landlord of commercial and industrial properties. Multi-faceted in both focus and skill, this company is involved in a variety of real estate investments and activities. A purchaser of undeveloped land and a company involved in property processes including planning, development, leasing, design, construction and property management, this organization has an undeniable industry reputation.
As you can imagine, this is a company with numerous users who all need access to critical applications and services – anywhere, on any device. Relying heavily on its web portal as a viable resource for thousands of people, the company began to experience slow response times, unreliable performance and limited access for users. As demand grew, the company decided to replace the existing web portal with Microsoft SharePoint, which would act as the single point of access for any application or service – internal or external.
With this change came complex security and access control issues. Users didn’t want to use a VPN and yet access needed to be controlled and restricted, and protection was needed to prevent malicious application layer attacks.
HoneyTek Systems was engaged by the real estate company to determine the most viable network security solution. After thorough analysis, HoneyTek Systems deployed redundant pairs of f5’s BIG-IP ADC devices running BIG-IP Local Traffic Manager (LTM), BIG-IP Global Traffic Manager (GTM), BIG-IP Access Policy Manager (APM) and BIG-IP Application Security Manager (ASM).
The GTM directs traffic to the closest or best performing site and provides failover to the secondary site. The APM controls user access policies to ensure that only authorized users access each application. Since f5 solutions are built on a unified platform, it was possible to deploy the ASM on the LTM devices without impacting any other services, and the ASM is now also able to provide the robust application level firewall needed to protect the organization’s infrastructure from application layer attacks.