Archive Search Articles

State of Application Delivery 2018: Security in the cloud, yes! Confidence, not so much.

by: Lori MacVittie

Digital transformation is a forcing function, encouraging automation and orchestration across IT and driving organizations to the decision to deliver apps from the public cloud. In fact, digital transformation permeates so thoroughly across IT...

State of Application Delivery 2018: Application Services are the Gateway to a Digital Future

by: Lori MacVittie

The primary purpose for our State of Application Delivery research is to understand the current – and predict the future – state of application delivery around the world. That means a focus on application services. These are the broad set...

Is DevOps ‘Build to Fail’ Philosophy a Security Risk?

by: Lori MacVittie

Breaking Betteridge’s Law of Headlines, the short answer is yes. But as all things today involving technology, the long answer is a bit more involved than that. DevOps has become, I think, fairly pervasive across all industries. While not...

State of Application Delivery 2018: Digital Transformation Changes Everything

by: Lori MacVittie

Digital transformation (DX) is a slippery term to define. As with cloud years ago and more recently, DevOps, the term is treated like silly putty in the hands of whomever uses it.

The State of Application Delivery 2018: Digital Transformation Driving Automation and Multi-Cloud Despite Security Concerns

by: Lori MacVittie

Discover the key findings of F5's fourth annual State of Application Delivery report.

Four Years in Review: What’s Changed in the State of Application Delivery

by: Cindy Borovick

With our 4th annual SOAD report published, we look back and share how the market has evolved, and what we have learned.

Identity Federation and SSO for Microsoft and F5 Customers

by: Mark Campbell

Buiding on our momentum from Microsoft Ignite in September, there is cause for merriment for those of you using Microsoft Active Directory Federation Services (AD FS). I am sensing disbelief, but read on, I promise the is joy afoot....

Welcome to 2018: Apps Under Siege

by: Lori MacVittie

Apps are the strategy upon which business has staked its digital survival, and F5 Labs research shows they will remain under siege in 2018. This year, let’s resolve to be vigilant in their protection, no matter whether they lie over hill in the...

F5 Year In Review

by: Drew Milam

As December brings 2017 to a close, it also marks an opportunity to be retrospective and look back on the year that was. This past month, we’ve been highlighting some of our blog posts, security research, reports, F5 Labs threat intelligence, and...

Five Predictions for 2018 You Can Pretty Much Bank On

by: Lori MacVittie

Lori MacVittie decided to put down in digital ink what the data and technology cycle is showing will be pretty much a given in 2018.

How does a WAF mitigate vulnerabilities?

by: Lori MacVittie

In our forthcoming State of Application Delivery 2018 report, we note that the use of web application firewalls (WAF) has been steadily increasing for years. That’s a good thing, because apps today are the gateway to customer and corporate data...

The Top 10, Top 10 Predictions for 2018

by: Peter Silva

Peter Silva looks into the crystal balls of IT industry pundits and compiles a list of annual predictions for the coming year.

Another Year of re:Invent, Another Year of Advances for F5 on AWS

by: Chad Whalen

F5's Chad Whalen reflects on the significant advancements F5 has made with AWS following an amazing week at AWS re:Invent.

Security Rule One: You’re probably violating it right now

by: Lori MacVittie

By now you’ve heard Security Rule Zero enough to know it by heart. You do know it by heart, right? Just in case, let me refresh your memory: THOU SHALT NOT TRUST USER INPUT. EVER. Excellent. Now that we’ve got that fundamental rule established...

Security Rule Zero: A Warning about X-Forwarded-For

by: Lori MacVittie

Proxies operate on the premise that they exist to forward requests from one system to another. They generally add some value like load balancing (scale), data leak prevention (security), or compression (performance).