F5 DevCentral Blog: Risk Remediation and the Power of iRules

Network and applications attacks are everywhere. The first line of defense is often your BIG-IP device.

Read More >

Blog: Don’t Sacrifice Services for Speed

No, not that kind of speed. The other kind of speed. Velocity, the speed with which applications can be developed and released into production, is a common driver of organizations adopting agile...

F5 joins Docker Partner Program to secure, scale & speed up Containerized apps

To say that Docker’s container technology is experiencing explosive growth and adoption is not mere hyperbole or wishful thinking on the part of its highly vocal advocates. Nary a day goes by that...

F5 Blog: An Office in the Clouds

A look at one of the most popular business productivity software suites ever, the keys to its longevity, and some of its challenges.

Read More >

Stop. Just Stop. HTTPS is not faster than HTTP.

Yes, Lori has been reading the Internet again. And what she’s been seeing makes baby Lori angry. It also makes this former test designer and technology editor cry. Really, I weep at both the...

Blog: The Answer to IT’s Kobayashi Maru is Private Cloud

In case you aren’t familiar with the concept: The Kobayashi Maru is a test in the fictional Star Trek universe. It is a Starfleet training exercise...

F5 a Leader in Gartner Magic Quadrant for Application Delivery Controllers for 10th Consecutive Year

Aug. 31, 2016 -- F5 celebrates a decade in the Leaders quadrant, positioned as highest in execution by prominent industry analysts

Read More >

Partner blog: Achieving business transformation with Cisco ACI, F5 BIG-IP, and BIG-IQ

Brief customer profiles from the US & Asia on F5/Cisco deployments

Blog: Securing your Borderless Business

You might have heard any number of folks here at F5 quip, “Identity is the new firewall.” That might sound, well, soundbitey but there’s a whole lot wrapped up in that simple statement. A whole lot...

Case Study: Fire Mountain Gems and Beads Gains Security, Manageability, and Efficiency with F5

Network World article – F5: It’s time to rethink security architecture

Using traditional security methods to secure an increasingly cloud-first, mobile-centric world is insane. It hasn’t worked, and it won’t work. August 4, 2016 – Network World

Blog: For Lift and Shift to the Cloud Success, Focus on Architecture

There has emerged two distinct models of “going cloud.” The first, most obvious, is the native approach. Native meaning new, either greenfield or rewritten. The native approach encourages a narrow...

Why Visibility Into Enterprise Apps Still a Major Security Issue

Enterprise security specialist F5 and the Ponemon Institute teamed up for a comprehensive study on application-centric security. Aug 22, 2016 – eWeek

Blog: App Security in the Changing Risk Landscape – Ponemon Report

Conducted in partnership with the Ponemon Institute, the report surveys 605 IT and IT security professionals about their approach to protecting applications...

3 Things the Network Must Provide for IoT

The Internet of Things (IoT) continues to be a topic of interest. And while consumer oriented gadgets and gizmos tend to make headlines, it’s the behind the scenes, in the data center prep work...

Blog: Applications. Applications Everywhere.

For the past few years we (as in the corporate We) have delved into the data center to discover how and why and where enterprises deploy and deliver applications with our State of Application...

Case Study: The Chinese University of Hong Kong Simplifies IT Infrastructure & Improves Security with F5

Case Study: Japan’s KEK Chooses F5 Solution to Protect Systems

The central computer system of the High Energy Accelerator Research Organization (KEK) underpins the organization’s diverse accelerator science research programs. KEK chose F5’s web application...

Blog: Financial Malware and its Tricks – Mobile Malware

Mobile devices are rapidly becoming the instrument of choice for digital users, impacting the financial sector as well. The new generation needs banking to be mobile-friendly, while also overcoming...

Read More >

Blog: Service providers feel pressure to secure new services while transforming to 5G networks

Service providers are challenged to scale networks to meet demand and maintain profitable business models. As the networks scale up and out...

Have you visited our Newsroom recently? Catch up on all things F5: https://t.co/TR9hrVoEV5 https://t.co/gAzeh029e1
5 minutes ago

#LightboardLessons: "Secure & Optimize VDI" with @psilvas: https://t.co/kajR1bkIxT @vmwarehorizon https://t.co/AQAq1VzhFZ
1 hour ago

Moving to the #cloud? @lmacvittie reminds you, "Don’t sacrifice services for speed": https://t.co/ecuvVypcQ1 #DevOps https://t.co/RYlafUdNGx
3 hours ago

Mark your calendar for our upcoming #webinar with @RedHatTelco: https://t.co/NAmrCQGIJX #NFV https://t.co/9ryRs06N1C
5 hours ago

"I got 99 problems, but #SWEET32 isn't one" by @dholmesf5: https://t.co/7XwjOjdZfl via @SecurityWeek #SSL https://t.co/PEPnpLiwK6
7 hours ago

"How to implement an effective #BYOD policy" https://t.co/FfutQzFb9s via @NetworkWorld
8 hours ago

"Banks move to #cloud for simplification, savings and a clearer view of costs" https://t.co/44lwNeObyc via @Forbes
10 hours ago

"Why enterprise IT still matters" https://t.co/XfPrAH1fvo via @CIOInsight
21 hours ago

"Your users have porous #passwords? Blame yourself, IT." https://t.co/WHG3H4hztc via @Computerworld
23 hours ago

We've had a busy week at #MSIgnite! Thanks to all those who stopped by the F5 booth for… https://t.co/aPc0PMaVrB
1 day ago

[Video] @nuagenetworks VSP and F5 BIG-IP Virtual Edition demo in Red Hat #OpenStack environments: https://t.co/OXZGaIwdfa #cloud
1 day ago

How are #IoT devices used in #DDoS attacks? Read our F5 Labs Threat Analysis Report: https://t.co/jRgcfN6AMa https://t.co/YwNir0jWXa
1 day ago

[Solution Brief] Dynamic service chaining with @F5Security #SSL Orchestrator: https://t.co/sSuk6Dvz6N https://t.co/EQyLRg6OJZ
1 day ago

"How can you protect what you didn't know was worth stealing?" by @garynewe: https://t.co/HlDMUhR8di via @HuffPostUKTech #Cybersecurity
1 day ago

Last chance #MSIgnite, visit the F5 Networks booth - #1618 - for demos on @Azure Security Center & @Office365. https://t.co/Mxwpo8emID
1 day ago