Archive Search Articles

Realizing FIPS Validation in Virtualized, SDN, and Cloud Data Centers

by: Henry Tam

Securing your data and infrastructure while transitioning to cloud (and software-defined everything) is complicated, but throw in tighter, stricter regulatory compliance and then you really have complexity and risk.

2020 Digital Horoscope

by: Kuna Nallappan

In foretelling the future of technology adoption and how it drives business transformation, this piece pays homage to astrology and envisions twelve key predictions to help define the new Asia digital economy.

iSeries: Not Just a Better, Bigger, and Faster BIG-IP

by: Robert Haynes

With the launch of F5's BIG-IP iSeries, you get innovative new platforms that can adapt hardware capacity to match your workloads.

Deploy a Turnkey, Enterprise-Class WAF in Azure

by: Robert Haynes

Cloud Infrastructure-as-a-Service has driven greater agility, reduced opportunity costs, and enabled businesses to concentrate on core concerns and deliver new digital services faster than ever before. At the same time, the threats to these...

Balancing Security, Agility, and Efficiency for Your Apps in the Cloud

by: Robert Haynes

Protecting your applications in the cloud against layer 7 attacks is an essential piece of any organization’s security strategy. The challenge lies in finding the right balance of strong security, operational efficiency,...

Enterprise-Grade Security for Your Cloud Apps

by: Robert Haynes

If you have HTTP applications in the cloud—any cloud—there is a reasonable chance they will be vulnerable. Applications and the protocols they run remain prime targets...

Authentication in Context: Add the Right Controls for Every User

by: Robert Haynes

Applications have escaped from the data center. Your business may have applications running in many different environments serving users who switch between locations and devices rapidly. As your infrastructure evolves to meet the challenges of...

F5 at Cisco Live 2016: Your apps are in the cloud; your services should be too!

by: Jezmynn Koh

Less than a week left before we head off to Cisco Live, Melbourne from 8 – 11 March 2016 and things are starting to get real! This year F5 is on a mission to help organisations migrate their applications to the cloud and secure their journey in a...

Identity theft: A threat more severe than you think

by: Kuna Nallappan

The financial services industry in Asia is one of the most heavily regulated sectors, and compliance is often touted as a form of security assurance. However, compliance is just a single aspect of security. Various regulations cover a wide range...

On Cloud Nine: Singapore’s journey to a Smart Nation

by: Kuna Nallappan

The Infocomm Development Authority (IDA) wants to make Singapore the world’s first Smart Nation, and this vision means connecting devices, things and people to provide better quality of life in an era of mobility, urban density, aging population...

Is SSL Smuggling Malware into your Business?

by: Gary Newe

We all know about SSL, that vital bit of cryptographical kit that protects our online communications. It protects communications between the web browsers we use and the servers where websites such as this one are hosted. You’ll recognise a secure...