Integrated security solutions for the multicloud era with F5
Published on 14/03/2025 in Solution news
Proximus NXT expert Bart Callens highlights how Proximus NXT and F5 deliver integrated security across clouds, boost resilience, and simplify compliance with NIS2 and DORA through AI-driven operations and threat defense.
Half of enterprises across Belgium and Luxembourg report decreased productivity due to cybersecurity incidents . To protect operations, businesses must overcome three critical security challenges:
- Safeguarding data across increasingly distributed hybrid and multi-cloud environments
- Increasing cyber resilience, especially against ransomware attacks
- Meeting complex regulatory compliance as new regulations like NIS2 and DORA reshape the security landscape
Modern enterprise architectures complicate all three of these challenges. Nearly 90% of organizations manage applications and data across a mix of on-premises infrastructure , hosted solutions, sovereign clouds and multiple public cloud platforms like AWS, Google Cloud and Azure.2 This often leads to an exponential increase in disconnected security tools and complexity. A unified approach to security is needed to efficiently and consistently protect data and applications everywhere.
Securing modern enterprises
To address distributed security challenges, enterprises need more than point solutions. They need a security framework that embraces the concept of a cybersecurity mesh , where different security components work seamlessly together to provide comprehensive protection for all assets everywhere.
Proximus NXT offers F5® Distributed Cloud and F5® BIG-IP Next solutions for comprehensive security that can be deployed anywhere applications run. These cloud-native solutions combine essential security capabilities, including:
- Advanced web application firewall (WAF) protection against OWASP Top 10 and emerging threats
- DDoS mitigation to stop attacks before they reach your infrastructure
- API discovery and security to protect increasingly critical API endpoints
- Bot defense to identify and stop malicious automated traffic
- Single management console for unified visibility and control across all environments
Through our long-standing partnership with F5, Proximus NXT can deploy, configure and manage these WAAP services wherever you need them—at the edge, in our hosted environment, or across multiple clouds—for consistent security policies and simplified management.
Increasing resilience
Integrating F5 security solutions fully within the Proximus Orbit Managed extended detection and response (XDR), security information and event management (SIEM) and security orchestration, automation and response (SOAR) solutions enables end-to-end protection, including automated action against emerging threats.
When security incidents are detected, our integrated SOAR capabilities can automatically adjust security settings and implement protective measures across F5 solutions. This automation is crucial for maintaining resilience against threats like ransomware attacks, which remain a persistent threat to organizations. Additionally, F5 solutions integrate with the continuous integration and continuous delivery (CI/CD) pipeline for robust security even when applications and infrastructure are rapidly changing.
Meeting compliance
By partnering with F5, Proximus NXT helps you build a compliant security architecture and monitor controls. Our Benelux team of over 350 dedicated security experts guides organizations on the most efficient ways to improve their security stance, helping them meet regulatory requirements effectively while maintaining operational resilience. Proximus NXT automates compliance monitoring and reporting, integrating security control data from F5 solutions to provide customers with comprehensive visibility and ways to improve compliance posture.

F5 provides multi-cloud application security and delivery solutions that help organizations deliver applications faster and with greater security. F5 assists organizations in optimizing applications and protecting users, regardless of where those applications reside—on-premises, in the cloud, or at the edge.
Looking ahead
We're embracing the future of security operations through Proximus Ada, the first Belgian center of excellence combining artificial intelligence (AI) and cybersecurity. This integration enhances our security operations center (SOC) operations and positions us to evolve alongside emerging threats.
The key to achieving resilience in today's complex environment lies in implementing security controls that can adapt to wherever your applications and data reside. Through our partnership with F5, we provide the expertise, technology and integrated approach needed to protect your organization's assets while ensuring regulatory compliance through a deep understanding of the Benelux market.
Let us help you design and implement a comprehensive security solution that meets your unique needs.