Container Danger in the Cloud

The slow but steady migration to cloud-based environments has had an impact on many aspects of IT. One we rarely make mention of is administration. But we should.

Read More >

Is 2017 Half Empty or Half Full?

F5 DevCentral's Pete Silva takes a look at tech trends thus far in 2017, with ransomeware (still) top-of-mind.

Unpacking a Multi-Cloud Approach

SVP Calvin Rowland breaks down what it means for organizations to deploy multi-cloud solutions, touching on DevOps topics as well.

Rethink Your Access Strategy, Think BeyondCorp

F5's Lee Slaughter offers his take on the 'zero trust' model, along with solutions from F5 and Google.

Read More >

Digital Transformation is More than just Going Paperless

F5's Lori MacVittie discusses the interplay between 'big box' and 'big digital' shopping in light of an experience economy.

Stop the IoT attack that comes before THE ATTACK

Generally speaking, the use of the term “attack” has come to mean an attempt to deny service to an organization. That’s likely because the frequency and volume of DDoS attacks have had serious...

In Container Land, Declarative Configuration is King

Digital transformation on the inside is integral to enabling digital transformation on the outside. One of the foundational components of internal digital transformation is automation, which relies...

Private Clouds Demand a Different Mindset

Successful private cloud adoption is not (just) about the infrastructure. It requires fundamental changes in the way your network operations work.

Production Ready is not User Ready

Continuous delivery is the penultimate goal of organizations’ embracing DevOps. It is not the ultimate goal, because that would continuous deployment. Much ado is made in the alleyways of DevOps...

TCP Optimization Enhancements for a Better Mobile Experience

The industry's use of TCP has evolved (far) beyond its original intentions. Patricia Du examines the ways TCP optimization better addresses modern user behavior.

SSL Performance Results: F5 VIPRION B4450 Test With Ixia CloudStorm 100GE

In April 2017, Ixia used its CloudStorm 100GE Application and Security Test Load Module to run an SSL performance test on an F5 VIPRION B4450 Application Delivery Controller blade in a VIPRION...

Read More >

F5 VIPRION 4450 Blade Delivers Unparalleled SSL Performance

To meet the challenges of a world where SSL is everywhere, all the time, enterprises must choose ciphers that are secure yet scalable—and deploy high performance application delivery solutions,...

How safe is safe enough?

F5's APAC team presents a stylized guide with tips on protecting yourself from cyber criminals and specific attacks.

Top Security Findings in the F5 State of Application Delivery Report

Nearly one in five of report respondents have security titles. F5's David Holmes takes a closer look at what's important to them.

Read More >

Automated App Services in Cisco ACI with F5 Private Cloud Solution Package for Cisco Networking

Today’s software-defined economy requires businesses to move faster than their competitors. Speed and agility are critical to keeping up with competitive demands for new applications, as well as...

Read More >

Virtualize to Scale on Demand: Dynamic Service Function Chaining in the S/Gi-LAN

F5's Patricia Du discusses service provider topics, including how value-added services improve the customer experience by controlling traffic based on user profiles, network policies, and...

F5 Networks Appoints Gabriel Breeman as Vice President to Drive Partner Sales Growth in APAC

Based in Singapore, Breeman will work with cross-functional leaders to strategically expand and evolve the F5 sales channels and alliance partner landscape.

New Auto Scaling & Standalone WAF solution for Amazon AWS

Let’s begin slightly off-topic by discussing the world’s favorite video on-demand service, Netflix. Between 2009 and 2016, Netflix observed a staggering increase in subscribers, from 12 million to...

Read More >

Good Enough is only Good Enough Until It Isn’t

Then it’s too late to cajole frustrated customers to come back. They’ve already found another provider of whatever it was you were trying to sell them.

Read More >

Three Things App Security is Not

App security is a lot of things, but sometimes we need to stop and consider what it isn’t, particularly as the volume and frequency of applications developed and deployed to meet the insatiable...

Are your business apps a cause for concern?

Commentary from F5's Shahnawaz Backer on Asia Pacific’s rise in global fintech investments, along with the related security considerations.

IDaaS, Everything but the Directory Sync

Commentary from F5's Mark Campbell on how SaaS and the subscription-based delivery of business applications have become a preferred consumption model.

Read More >

Line2 Gains Visibility into Attacks with F5 Silverline DDoS Protection

Guest post from customer Jennifer Cohen, Director of Operations at Line2, a San Francisco-based company that provides cloud phone service for small businesses

Read More >

A Tech Marketer's Guide to Unscrambling the Shoptalk

CMO Ben Gibson chats with Campaign Asia on the success of F5's 'We make apps go: Faster. Smarter. Safer' initiative.

Yak Shaving: CISOs Aren’t Immune

Sometimes, CISOs spin their wheels doing useless security activity that only looks productive from the outside.

Serverless isn’t about servers, it’s about apps

There’s a lot of confusion surrounding the concept of “serverless computing.” That could be because it’s quite erroneously named. It’s not about servers or computing.

Read More >

App Services at the Heart of the Experience Economy

We hear a lot about the digital economy and the API economy, but the experience economy is what both are powering.

Read More >

Nearly Half of Orgs Hit by Smokescreen DDoS Attacks

Information security is rife with military terminology. That’s unsurprising, given the abstract relationship between the opposing forces; one trying to attack while the other defends. Modern DDoS...

Forget uptime. A low MTTR is the new ‘5 9s’ for IT

Outages are expensive. Whether they’re ultimately the result of an attack or a failure in software or hardware isn’t that relevant. The costs per minute of downtime are increasing, thanks to the...

How to make digital transformation a reality

Digital transformation isn't about using technology to do the same things you've always done—it's about doing things that weren't possible before.

Read More >

SambaCry: The Linux Sequel to WannaCry

With simple exploits plaguing Windows and Linux SMB week over week, do yourself a favor and patch for CVE-2017-7494 now to avoid having to do it in panic mode.

Read More >

The CISO: A Field Guide

Learn to recognize different types of CISOs so you can ensure you’re hiring the right one.

Fight Credential Stuffing by Taking a New Approach to Authorization

How a token-based authorization model can help organizations dramatically reduce credential stuffing attacks.

Time for NetOps to Embrace Continuous Deployment

Continuous deployment doesn’t have to mean every change, every time, right away. But it does have to start somewhere. CI/CD (Continuous Integration/Continuous Delivery) is the domain of...

THE HUNT FOR IoT: The Networks Building Death Star-Sized Botnets

With a growth rate of 1,473% in 2016, the hunt for vulnerable IoT devices rages on...

F5 Application Services for a Multi-Cloud World

BARCELONA – At its annual EMEA Agility partner and customer conference, F5 announced the availability of offerings designed to provide consistent application services in multi-cloud environments.

Read More >

New Solutions Enable the Multi-Cloud World

SVP Sangeeta Anand takes a closer look at the promise of multi-cloud environments and new technologies from F5.

A Multi-Cloud Strategy Needs Multi-Cloud Solutions

There is little doubt (in my mind, at least) that the new standard operating model for enterprise organizations is based largely on cloud. I use the term “cloud” as a broad umbrella for both...

State of Application Delivery 2017: Cloudy Challenges

Cloud is not going away, and multi-cloud is definitely the target destination for most organizations today. What remains is the journey to get there.

Read More >

"Tech execs don't have enough time for innovation": via @CIOInsight #CIO
4 hours ago

"Stumped by #DevOps? Experts share their views on how to do DevOps right" ft. F5's @PearceNathan:…
7 hours ago

RT @F5Security: Security: It's not a game. Get the facts from @F5Networks at #BHUSA this week:
7 hours ago

We're just 1 week away from #F5Agility17! Attendees, download the event mobile app from the Google Play or Apple Ap…
8 hours ago

RT @puppetize: Attending #F5Agility17? Come visit the Puppet kiosk in the Solution Expo. We'd love to see you!
10 hours ago

"#Phishing for Information (Part 2): How attackers collect data about your employees" by @dunsany:…
10 hours ago

Move at the speed of business with our Private #Cloud 101 whitepaper:
12 hours ago

"#Container danger in the #cloud" by @lmacvittie: #security
14 hours ago

"The top 10 digital trends influencing organisations and the world around them" with @MBF5Net: via @InformationAge
16 hours ago

"Worried about #ransomware? Here are 3 things IT leaders need to know before the next outbreak" via @TechRepublic
18 hours ago

"Singapore government uncovers lapses in IT systems control" via @ZDNet
1 day ago

Need summer reading suggestions? "10 books on #cloud computing that all IT leaders should read" via @TechRepublic
1 day ago

RT @F5Security: ICYMI - "Rethink your access strategy, think BeyondCorp" by Lee Slaughter: via @F5Networks…
1 day ago

Attending #BHUSA? Meet @F5Labs #InfoSec experts, attend our workshops, & visit the booth this week:…
1 day ago

"What is #IoT?" via @NetworkWorld
1 day ago

"When companies get #hacked, should they be allowed to hack back?" via @TheAtlantic #cybersecurity
1 day ago

"How a small city in Finland turned Into a #5G pioneer" via @PCMag #mobile
1 day ago