F5 Blog

 

Are IoT Message Protocols the Next Security Challenge for Service Providers?

by: Patricia Du

The growing number of connected devices in the Internet of Things (IoT) provides an opportunity for service providers to develop new streams of revenue. For end users, IoT has the potential to...

Benefits of a Tier-1 US Operator’s NFV Implementation

by: Patricia Du

Operators are looking for an open, multi-vendor NFV platform to evolve and scale their networks to lower costs, reduce time to market, and improve operational efficiencies.

The Role of Optimization in 5G Networks

by: Raffaele D'Albenzio

As we all know, 4G and LTE are designed to improve capacity, user data-rates, spectrum usage, and latency. 5G represents more than just an evolution of mobile broadband.

Container Orchestration Illustrates Power of the (Other) API Economy

by: Lori MacVittie

Digital transformation cannot be focused solely on the outside, it must include the inside as well. This year’s buzzword bingo card includes the amorphous phrases “digital transformation” and “API economy.” They have real meanings, but they’re...

Virtualizing the Gi LAN – Do’s and Don’ts

by: Bart Salaets

After many years of discussions and proof of concepts, network functions virtualization (NFV) is now moving away from the conceptual to the realization stage.

Hello IoT, Goodbye Security Innocence

by: Bernd Kunze

2016 showed us that the Internet of Things (IoT) is a game-changer when it comes to service provider networks.

There are only 2 types of clouds: Those you control and those you don’t

by: Lori MacVittie

Cloudy insights from the State of Application Delivery 2017 – Control. We use that word a lot. Control yourself! Control your own destiny! Control your financial future. Find out how! Control is a simple word that connotes a very powerful concept...

RSA: Building an Application Security Ecosystem

by: Preston Hogue

At F5, we talk a lot about concepts like the changing threat landscape and the dissolving perimeter – that applications and user identities are increasingly the primary targets of malicious attacks because these are the new gateways to valuable...

Credential Theft: Easy as Shooting Phish in a Barrel

by: Lee Slaughter

Imagine your best-case scenario: You’ve conducted security awareness training for your users and have educated them on all the threats that apply to them. You’ve cultivated a culture of security where everyone knows the tactics of phishers...

Protecting Identity in the Cloud

by: Lee Slaughter

A few months ago, my colleague wrote about accelerating adoption of Office 365 and the importance of security for cloud-based applications. His posts underscored the need for a secure, centralized identity and access solution that can scale...

Choose ID over IP. Please.

by: Lori MacVittie

I take lots of pictures. Sometimes I’m using WiFi. Other times I’m out by the pond (fishing, if you must know) and using my cell connection. Same house. Same location. And yet the geolocation information embedded into pictures taken in the same...

Templates are Taking over the Cloud

by: Lori MacVittie

Cloud – and for purposes of this post I mean infrastructure as a service (IaaS) – enables business agility primarily be freeing those tasked with deploying apps from the complexity of all the infrastructure wiring underneath.  By no...

Internal Email from John McAdam Announcing New CEO

by: John McAdam

F5 Networks announced that François Locoh-Donou has been named the company's President and CEO and a member of F5's Board, effective April 3, 2017.

If an app can’t go to the cloud, the cloud must go to the app

by: Lori MacVittie

Insights from the State of Application Delivery 2017 Many (and I mean a lot) of folks push back on the very existence of the idea of private (on-premise) cloud. This is not new; I’ve been fighting the “public is the only way” false dilemma for...

DNS Security Risks for Service Providers in the Internet of Things

by: Patricia Du

The Internet of Things (IoT) represents a large new business opportunity for service providers to develop new streams of revenue. For end users, IoT has the potential to provide solutions that can dramatically enhance productivity.