IT Automation is Strategic

What if I told you that “mainframes host more transactions daily than Google (1.3 million/second on CICS vs. 68,542/second on Google), including 55 percent of all enterprise transactions.”...

Azure Stack Support – Expanding F5’s Multi-Cloud Ecosystem

F5 empowers Azure users to further enhance the hybrid capabilities of architectures through replication of supporting application services across environments.

Read More >

See How to Route Apps across Multi-Cloud Containers with F5 and Red Hat

F5 is at Red Hat Summit this week demonstrating multi-cloud capabilities with OpenShift Containers, Ansible automation, and Aspen Mesh / Istio insight.

Read More >

NetOps Take Note of SRE Focus on MTTR to Realize Availability

Site Reliability Engineer (SRE) is a relatively new role – usually within engineering or operations – focused on maintaining, unsurprisingly, site reliability. That generally means availability of...

Why is a Declarative Model Important for NetOps Automation?

Lori MacVittie: If you’re going to automate all the things, go declarative.

BIG-IP Cloud Edition: Per-app Security and Scale

There is a new network coming to a data center near you. And by ‘near you’ I mean within walking distance of your desk. Whether we like it or not, pressure from digital transformation continues to...

Read More >

How IoT can compromise network integrity

The IoT (Internet of Things) is shaking up the networking space and paving the way for machine-to-machine (M2M) communication and automated processes.

Read More >

Open Source Spotlight: URL rewrite and Helm charts

Lori MacVittie looks at how technologies like F5 Container Connector help navigate the routes between modern environments and traditional networking.

Incredible security content at F5’s ANTICIPATE 2018 event

“Guys, did you hear? The team in ASEAN is building a security conference to rival the best in business. They call it ANTICIPATE!” That’s the rumor going around the F5 world and its true. We’re...

What is Infrastructure as Code for NetOps?

As DevOps approaches creep over the wall into network operations, it drags with it new terminology. These colloquialisms can be confusing to NetOps who’ve not encountered them before, and can...

F5 Announces New Application Services Offering for Multi-Cloud Environments

SEATTLE – F5 Networks (NASDAQ: FFIV) today introduced BIG-IP Cloud Edition, available May 31, enabling customers to quickly deploy critical application services for every app and any...

Stop DDoS Attacks Before They Deny Your Profitability

The recent State of the Internet/Security Report from Akamai shows that the number of Distributed Denial of Service (DDoS) attacks continues to increase—rising 14% over last year. This might not...

Read More >

F5 Networks Announces Second Quarter Fiscal 2018 Results

SEATTLE – F5 Networks, Inc. (NASDAQ: FFIV) today announced revenue of $533.3 million for the second quarter of fiscal 2018, up 2.9% from $518.2 million in the second quarter of fiscal 2017....

Per-App Architectures Protect Apps at Home and in the Cloud

The data center is being driven to change by digital transformation, with cloud, containers, and catastrophic breaches prompting this evolution sooner rather than later.

Eight Reasons Why the Future of Scaling Containers is Service Mesh

Microservices are great for development velocity, but the complexity in these architectures lies in the service-to-service communication that microservices depend on. There are, right now, at...

Read More >

Workflows versus APIs

There's an API tax. It's the time and technical debt incurred by executing complex processes using individual API calls. And it grows as processes expand.

Read More >

The Three AWS Web Application Firewall Managed Rules You Need to Deploy Now

A mind-boggling number of applications reside in the cloud without any protection. No web app firewall. No identity or access control. Nothing. They’re just out there, open to attack. That’s a...

F5 Launches Advanced WAF For Multi-Cloud App Security

CANBERRA, AUSTRALIA – Coinciding with the ACSC conference this week, F5 Networks (NASDAQ: FFIV) is announcing its Advanced Web Application Firewall™ solution for comprehensive application...

Advanced threats require advanced solutions

Perspective from F5 SVP Ram Krishnan around digital transformation, and applications' role as both key business driver and high-value target.

WhiteHat & F5 link up for total web app security

Firms of all sizes rely on web applications for just about everything. Unfortunately, attackers know this too.

What Makes a WAF Advanced?

As the threat landscape evolves, so must our security controls and countermeasures. The most advanced perimeter threats for data loss or exfiltration occur at the application layer...

Business as Usual, Making the CISO Smile

As organizations transform the business with new applications and automation, it usually means exposing these business applications to the Internet and all the dangers that come with it.

Read More >

There is no such thing as a non-critical app when it comes to security

At Thermopylae, so the story goes, the Persians were able to defeat the Spartans by outflanking them thanks to a narrow goat path rather than the expected frontal assault.

Read More >

Why A Per-App Approach to Application Services Matters

I can’t read minds (my kids would disagree but that’s neither here nor there) but I can read the responses to our State of Application Delivery survey. And when I read them through the lens of...

Old Dog, New Targets: Switching to Windows to Mine Electroneum

Apache Struts 2 Jakarta Multipart Parser RCE crypto-mining campaign is now targeting Windows, not just Linux systems.

How Cloud and Containers are Driving Application Services to Disaggregate

Applications drive decisions on everything from location to the form-factor of delivery infrastructure, based on app needs and requirements.

Open Source Spotlight: New F5 modules in Ansible

New F5 modules have been added with more security profiles, licensing support, and monitoring. More information and community support for a variety of playbooks is available on DevCentral or Github.

Balancing Security and Performance with Web Application Firewalls

Using a WAF you can parse, pull apart, twist, and modify content however you want. But just because you can, doesn’t mean you should.

Twelve Tips to Help Employees Keep Devices Secure When Away from the Office

Laptops full of confidential data are still getting stolen, and public Wi-Fi hotspots are being booby-trapped. CISOs need to make users aware of the threat to prevent this from happening.

F5’s BIG-IP and IBM Cloud Private Integration

Microservice architectures are becoming the standard for cloud native workloads, but what about layer 4–7 services?

Production Pain Points and the Application Services that Relieve Them

Developers in a RisingStack survey cite performance, security, and deployment difficulties in production environments Not all security and performance is the result of ‘bad code’. Platforms and...

F5 Survey Reveals Digital Transformation Initiatives Driving Sudden Surge in Emerging Application Services for Government Organizations

State of Application Delivery report shows rise of multi-cloud architectures necessitating automation and application-centric security

I’ve Taken the Super-NetOps Course. Now How Do I Develop my Powers?

Robert Haynes walks you through suggested next steps once you've completed F5's initial Super-NetOps training.

The Hunt for IoT Exposes Targeting of Build Infrastructure

The Hunt for IoT by our own F5 Labs threat researchers continues. Its latest report exposes not only an active search for vulnerable IoT devices, but the targeting of build infrastructure.

The Hunt for IoT: The Growth and Evolution of Thingbots Ensures Chaos

IoT attacks show no signs of decreasing while infected IoT devices go un-remediated, and discovery of new thingbots is at a decade-long high.

Garbage In, Garbage Out: Don’t Automate Broken Processes

When I was a wee lass getting ready to deliver my company’s very first Internet-enabled application, I learned a valuable lesson. It wasn’t about technology. It wasn’t about the Internet. It was...

F5 Acquires Microsoft Gold Cloud Competency

Confidence in the public cloud is on the rise as the market and platforms mature, thanks in part to certification and competency validations from major providers.

Announcing F5 Managed Rulesets for AWS WAF

AWS has just announced enhanced F5 managed security capabilities on AWS WAF around Bot Protection, CVE Vulnerabilities, and Web Exploits.

The Importance of ADCs for IoT in Public Cloud Environments

With F5 BIG-IP virtual editions, IoT-focused organizations can seamlessly deploy in public or multi-cloud environments with maximum flexibility.

New F5 Private Cloud Solution Package for OpenStack

OpenStack supports an increasing number of mission-critical applications, but it can still be complex to set up. F5 makes it easier.

NetOps Needs to be Agile because the Cloud Can Change Overnight

NetOps needs to embrace DevOps methodologies and principles to restore the balance of stability and speed to support the growing number of applications deployed in the public cloud. There is a...

Three Signs of an App Attack Developers Should Know

Apps are under siege. Attacks occur with alarming frequency – every 39 seconds according to research conducted by the University of Maryland

Read More >

Download our free eBook, “Application Security: A Step Toward #GDPR Compliance,” here:
1 hour ago

“Get creative to reach the C-Suite: Explore alternate paths”: via @Forbes
13 hours ago

“Does #blockchain have a place in business?” via @ITPro
15 hours ago

Don't miss @lmacvittie's take on a recent SRE report: #NetOps
17 hours ago

F5 Advanced WAF uses signatures & behavioral analytics to protect your apps from multiple layer 7 attacks launched…
19 hours ago

RT @F5Security: F5 Advanced #WAF can identify and block attacks that other WAF solutions don’t have the capabilitie…
20 hours ago

Did you know that #Mirai has been growing significantly in certain parts of the world? Check out @F5Labs' Threat An…
21 hours ago

“Useful or useless? Identifying the business case for #IoT”: via @Forbes
23 hours ago

“10 best practices to keep your #IT project under budget”: via @TechRepublic
1 day ago

"Are you an authentic leader?" via @Forbes
1 day ago

“#IoT World: The edge is getting smarter, smaller, and moving further out”: via @datacenter
1 day ago

RT @F5Security: ICYMI - “#Drupalgeddon2 highlights the need for AppSecOps” by @lmacvittie via @F5Labs:…
1 day ago

ICYMI - “@Azure Stack support – expanding F5’s #MultiCloud ecosystem” #BIGIP
1 day ago

“Managing compliance issues within the value chain” via @F5Labs' guest blogger @KipBoyle:
1 day ago

RT @ONUG_: The Disruption of #Cloud Runs Deeper Than You Think via Lori MacVittie, Principal Technical…
1 day ago

ICYMI - “#IT automation is strategic” by @lmacvittie: #cloud
1 day ago

“5 emotionally intelligent habits for handling work frustrations”: via @FastCompany
1 day ago

“Tips for reading the room before a meeting or presentation”: via @HarvardBiz
2 days ago

ICYMI - “Panda #malware broadens targets to #cryptocurrency exchanges and social media” via @F5Labs:…
2 days ago

Here are some highlights from this morning's #BikeEverywhereDay festivities in Seattle, where we celebrated with F5…
2 days ago