Blog: Authentication in Context – Add the Right Controls for Every User

Applications have escaped from the data center. Your business may have applications running in many different environments serving users who switch between locations and devices rapidly. As your...

Rigidity of the Org, not Hardware, is Holding up App Deployments

The solidification of the divide between traditional IT and a more agile, DevOps-driven IT is resulting in the emergence of essentially a two-tiered, data center architecture. This should not be...

SSO with BIG-IP & VMware Workspace ONE

At VMworld Europe 2016, VMware & F5 announce new collaboration that enables simple and secure single sign-on to all business apps.

Read More >

Blog: Get Off of My Cloud!

The latest from F5's Jay Kelley includes a list of considerations when deploying a new identity and access solution for Microsoft Office 365.

Read More >

Blog: Managing Identity in SaaS Applications

The rise of business applications delivered “as a Service” can be great for cost savings and operational efficiency. After all, who really wants to spend hours and hours implementing a new HR or...

Blog: Colo Cloud – The Best of Both Worlds

Cloud, compliance, and certifications. It's a complex world out there.

You want big data? You can’t handle big data…

Current infrastructure cannot handle the projected explosion of data, connections, and traffic as the world moves into the digital economy. We talk about the digital economy but we don’t often...

Read More >

Blog: Managing Identity and Access in a Multi-Cloud World

F5's Robert Haynes discusses application security in the cloud and the importance of a single source of truth.

Read More >

Blog: Bug Bounty Programs Only Half the Battle

My father was a fan of westerns. And not just the Lone Ranger but all the old, black and white westerns. The ones with Gene Autry and Smiley Burnette and John Wayne. Bonanza, too, was a must if it...

F5 Blog: An Office in the Clouds

A look at one of the most popular business productivity software suites ever, the keys to its longevity, and some of its challenges.

F5 Labs: Mirai – The IoT Bot That Took Down Krebs and Launched a Tbps DDoS Attack on OVH

The “Mirai” botnet has infected hundreds of thousands of Internet of Things (IoT) devices, specifically security cameras, by using vendor default passwords for Telnet access. This IoT botnet...

Read More >

Are Mobile Operators Ready for the Connected Car?

A look at the promise of IoT on the road (as well as a few cautions).

Read More >

Blog: Don’t Sacrifice Services for Speed

No, not that kind of speed. The other kind of speed. Velocity, the speed with which applications can be developed and released into production, is a common driver of organizations adopting agile...

Stop. Just Stop. HTTPS is not faster than HTTP.

Yes, Lori has been reading the Internet again. And what she’s been seeing makes baby Lori angry. It also makes this former test designer and technology editor cry. Really, I weep at both the...

F5 a Leader in Gartner Magic Quadrant for Application Delivery Controllers for 10th Consecutive Year

Aug. 31, 2016 -- F5 celebrates a decade in the Leaders quadrant, positioned as highest in execution by prominent industry analysts

F5 joins Docker Partner Program to secure, scale & speed up Containerized apps

To say that Docker’s container technology is experiencing explosive growth and adoption is not mere hyperbole or wishful thinking on the part of its highly vocal advocates. Nary a day goes by that...

Blog: The Answer to IT’s Kobayashi Maru is Private Cloud

In case you aren’t familiar with the concept: The Kobayashi Maru is a test in the fictional Star Trek universe. It is a Starfleet training exercise...

F5 DevCentral Blog: Risk Remediation and the Power of iRules

Network and applications attacks are everywhere. The first line of defense is often your BIG-IP device.

Case Study: The unbelievable Machine Company Improves Cloud & Security Services with F5

Case study video: Alberta Motor Association lifts and shifts on-premises security to the AWS cloud with F5

Partner blog: Achieving business transformation with Cisco ACI, F5 BIG-IP, and BIG-IQ

Brief customer profiles from the US & Asia on F5/Cisco deployments

Read More >

"Not all IT incidents are created equal: How to manage escalations" via @TechRepublic
7 hours ago

"7 communication tips for managing remote workers" via @Inc
9 hours ago

"9 big ideas IT shouldn’t ignore" via @Computerworld
11 hours ago

"Why #CIOs should take mentor programs seriously" via @CIOonline
13 hours ago

"#Cloud computing: You are probably ignoring the biggest #security flaw" via @ZDNet
16 hours ago

"#5G is coming, but #4G isn't going away any time soon" via @Forbes #mobile
18 hours ago

"9 reasons #DevOps is a dirty word" via @InformationWeek
1 day ago

"These mundane jobs bots can take in the #enterprise" via @NetworkWorld
1 day ago

[VIDEO] Here are 3 ways to try F5 BIG-IP virtual editions in @awscloud: #cloud
1 day ago

"Regaining control in the #cloud" by @lmacvittie: via @NetworkComputin
1 day ago

#LightboardLessons: "#DNS scalability & security" with @psilvas: via @devcentral
1 day ago

Alberta Motor Association (@AMAcommunity) partners with F5 to secure #cloud apps:
1 day ago

"#NFV helps telcos save money on #WAN infrastructure" via @ComputerWeekly
1 day ago

"Prescribing the right medicine for IT in pharmacies" via @ZDNet
2 days ago

"#CIOs move more dollars to digital transformation" via @CIOonline
2 days ago