Blog: Hardware’s Innovation Theorem

I recently finished reading Fermat’s Last Theorem (Simon Singh) which, you might be surprised to learn, was full of drama, intrigue, murder, and mistresses. Really. The history of math is quite...

F5 Launches Turnkey WAF Solution in Microsoft Azure Security Center

July 21, 2016 – With today’s introduction of Azure Security Center, F5 has demonstrated its continued application security leadership with greater integration and ease of deployment. The latest F5...

Read More >

F5 Names Ben Gibson as Chief Marketing Officer

SEATTLE – F5 Networks (NASDAQ: FFIV), the global leader in application networking and security, today announced the addition of Ben Gibson to its executive team as Chief Marketing Officer...

Read More >

F5 Networks Announces Results for Third Quarter of Fiscal 2016

SEATTLE – For the third quarter of fiscal 2016, F5 Networks, Inc. (NASDAQ: FFIV) announced revenue of $496.5 million, up 3 percent from $483.7 million in the prior quarter and 3 percent from $483.6...

Blog & Infographic: How the Debate between Privacy and Security is Evolving

Some of you may remember a time when national security was a question of protecting individuals from crime on the street, or the Army’s defense against international threats. Today, that picture...

Pokémon Go Launch Reminder Why ‘Build to Scale’ Important as ‘Build to Fail’

One of the catch phrases of DevOps and cloud for the past, oh, many years has been “build to fail.” The premise being that too many businesses experience costly downtime and loss of revenue (and...

Read More >

Case Study: Communications Services Firm Gains Huge Data Throughput with F5 & Cisco ACI

West prioritized software-defined networking, an application-centric infrastructure, and the ability to intelligently manage high-volume traffic on demand—functionality that integrated F5 and Cisco...

Blog: Cisco Live and F5

With fireworks in our rearview mirror, it’s time to turn our focus toward Las Vegas for Cisco Live, July 10-14, at the Mandalay Bay. Whether you’re going to the event or following online, here’s a...

Blog: Scale in the age of Secure Everything

At Apple’s WWDC (World Wide Developer Conference) in June, the mobile mogul announced that as of January 1, 2017, all apps in the app store MUST (that’s the RFC style MUST for those networkers...

Security in the Cloud: The Business Perimeter

When Leonidas of the Spartans found himself faced with the prospect of defending Sparta against the totally much bigger and meaner Persian army, he specifically chose the narrow pass at Thermopylae...

Blog: Operations in a Hybrid World

The pace of change in the realms of the digital age is unprecedented. Driven by evolving consumer demands, changing industry structures, as well as accelerating technology development, the business...

Security’s Last Mile: The User

When we talk about “the last mile” in networking, we’re usually talking about that leg of the Internet where data moves between the provider’s network to the user’s network. That used to be a...

Read More >

F5 Secures IoT and 5G Networks with Availability of Standalone Carrier-Class Firewall

Announced at Mobile World Congress Shanghai, a high-performance and scalable carrier-class firewall solution focused on delivering end-to-end security across service provider networks.

Read More >

Secure the NEXT – Mitigate DDoS attacks

There are more than 3.4 billion internet users globally with an estimated 6.4 billion IoT devices being connected to it, making the ecosystem a burgeoning exchange where information and...

Blog: Brace yourselves. Serverless is coming.

Technology moves quickly. Or maybe it just seems like it moves quickly because new movements, approaches, and architectures are popping up left and right. This month, it’s the sudden rise of...

Blog: Blue Medora and F5 Partner on BIG-IP vRO Plugin

Grand Rapids is the second-largest city in Michigan, located in the lower peninsula (what we in the Midwest refer to more colloquially as “under the bridge”). There are no remarkable landmarks in...

Read More >

Infographic: Secure and scale Gi LAN with the lowest TCO in the industry

Today's mobile network infrastructures are expected to provide highly available services and excellent subscriber experiences.

Read More >

F5 Security Blog: Dridex is Watching You

The developers of the Dridex malware display great proficiency in client and server paradigms as well as obfuscation. The following research outlines this skillset. It, along with Dridex authors’...

Blog: Making Apps Go Faster

As we continue to break up the data center by breaking applications and the networks on which they depend, one business aphorism remains true: speed is king. Performance remains a business level...

Blog: Leveraging the Application World

Twenty-five years ago, applications were monolithic software programs that ran in huge data centres and used by the select few. Today, with Internet and mobile devices, applications are everywhere...

Blog: Betting on OpenStack to Evolve Service Provider Infrastructures

Service providers want to scale their networks with virtual functions to lower costs, reduce time to market, and improve operational efficiency.

"#IoT is changing how businesses work and driving new processes" via @Forbes
2 hours ago

Building a #F5Agility16 to-do list? First on the list should be to download the mobile app:
3 hours ago

#LightboardLessons: "HTTP/2" with @JohnWagnon: via @devcentral #HTTP2
4 hours ago

RT @F5Security: Coming soon: Your new source for actionable, F5 data-driven threat intelligence.'> #BHUSA https://t.c
5 hours ago

"Hardware’s Innovation Theorem" by @lmacvittie: #security
6 hours ago

Register for tomorrow's #webinar with @nutanix: #cloud #NEXTConf
8 hours ago

"Why you need service templates" by @PearceNathan: via @devcentral #cloud #DevOps
10 hours ago

"5 ways to become a #CIO 2.0" via @CIOInsight
11 hours ago

"Consortium for #SDN switching and controller interoperability" via @NetworkingTT
13 hours ago