F5 products allow for the granular access control of each request sent to a protected system to determine whether that request presents a threat to the system.
Each request can be granted or denied access based on:
Cryptographic functions (SSL/TLS) can be enforced to meet the agency's requirements in a FIPS 140-2 certified manner
These capabilities can be deployed in a NetOps fashion or using DevSecOps capabilities to protect traditional or kubernetes microservices based applications