Blog: How to Scale Your Limited Network Staff – Get Rid of the Yaks

There are many lamentations in the tech industry regarding the “skill gap” in security. That’s the inability of organizations to find talented security professionals to fill increasingly critical...

Vivo Uses F5 Solutions for the New Vivo Secure Web Application Service

Vivo, a telecom provider with $11 billion in revenue in 2015, launched its own cloud-based security service for small- and mid-sized businesses. The new Vivo Secure Web Application uses F5...

F5 Launches Turnkey WAF Solution in Microsoft Azure Security Center

July 21, 2016 – With today’s introduction of Azure Security Center, F5 has demonstrated its continued application security leadership with greater integration and ease of deployment. The latest F5...

Read More >

F5 Networks Announces Results for Third Quarter of Fiscal 2016

SEATTLE – For the third quarter of fiscal 2016, F5 Networks, Inc. (NASDAQ: FFIV) announced revenue of $496.5 million, up 3 percent from $483.7 million in the prior quarter and 3 percent from $483.6...

Read More >

Blog: Hardware’s Innovation Theorem

I recently finished reading Fermat’s Last Theorem (Simon Singh) which, you might be surprised to learn, was full of drama, intrigue, murder, and mistresses. Really. The history of math is quite...

F5 Names Ben Gibson as Chief Marketing Officer

SEATTLE – F5 Networks (NASDAQ: FFIV), the global leader in application networking and security, today announced the addition of Ben Gibson to its executive team as Chief Marketing Officer...

Case study: INSEE Digital supports Siam City Cement Company with app-centric hybrid infrastructure

INSEE implemented F5's BIG-IP Local Traffic Manager to provision, optimize, and deliver services.

Read More >

Blog & Infographic: How the Debate between Privacy and Security is Evolving

Some of you may remember a time when national security was a question of protecting individuals from crime on the street, or the Army’s defense against international threats. Today, that picture...

Read More >

Pokémon Go Launch Reminder Why ‘Build to Scale’ Important as ‘Build to Fail’

One of the catch phrases of DevOps and cloud for the past, oh, many years has been “build to fail.” The premise being that too many businesses experience costly downtime and loss of revenue (and...

Blog: Cisco Live and F5

With fireworks in our rearview mirror, it’s time to turn our focus toward Las Vegas for Cisco Live, July 10-14, at the Mandalay Bay. Whether you’re going to the event or following online, here’s a...

Security in the Cloud: The Business Perimeter

When Leonidas of the Spartans found himself faced with the prospect of defending Sparta against the totally much bigger and meaner Persian army, he specifically chose the narrow pass at Thermopylae...

Read More >

Blog: Scale in the age of Secure Everything

At Apple’s WWDC (World Wide Developer Conference) in June, the mobile mogul announced that as of January 1, 2017, all apps in the app store MUST (that’s the RFC style MUST for those networkers...

Blog: Operations in a Hybrid World

The pace of change in the realms of the digital age is unprecedented. Driven by evolving consumer demands, changing industry structures, as well as accelerating technology development, the business...

Security’s Last Mile: The User

When we talk about “the last mile” in networking, we’re usually talking about that leg of the Internet where data moves between the provider’s network to the user’s network. That used to be a...

Case Study: Communications Services Firm Gains Huge Data Throughput with F5 & Cisco ACI

West prioritized software-defined networking, an application-centric infrastructure, and the ability to intelligently manage high-volume traffic on demand—functionality that integrated F5 and Cisco...

Secure the NEXT – Mitigate DDoS attacks

There are more than 3.4 billion internet users globally with an estimated 6.4 billion IoT devices being connected to it, making the ecosystem a burgeoning exchange where information and...

F5 Secures IoT and 5G Networks with Availability of Standalone Carrier-Class Firewall

Announced at Mobile World Congress Shanghai, a high-performance and scalable carrier-class firewall solution focused on delivering end-to-end security across service provider networks.

Read More >

Blog: Blue Medora and F5 Partner on BIG-IP vRO Plugin

Grand Rapids is the second-largest city in Michigan, located in the lower peninsula (what we in the Midwest refer to more colloquially as “under the bridge”). There are no remarkable landmarks in...

Read More >

Blog: Brace yourselves. Serverless is coming.

Technology moves quickly. Or maybe it just seems like it moves quickly because new movements, approaches, and architectures are popping up left and right. This month, it’s the sudden rise of...

#TGIF - "Remember all the times you overshared at work" https://t.co/NbHA2SdFYy via @FastCompany
8 hours ago

"The worlds of #OpenStack and containers are colliding" https://t.co/wo9xwZNZtQ via @NetworkWorld
9 hours ago

"Creative ways companies are helping employees power through the afternoon slump" https://t.co/xV6RbCfY83 via @FastCompany #productivity
11 hours ago

Joining us in Chicago for #F5Agility16? Give us a retweet and download our event app: https://t.co/33wBmWE5GD https://t.co/EwWt0OZaD8
13 hours ago

"How to scale your limited network staff: Get rid of the yaks" by @lmacvittie: https://t.co/2w7I0827np #DevOps https://t.co/Hyq6aMLkvF
15 hours ago

Don't miss your chance to take an @F5Certified exam during #F5Agility16? Schedule it today: https://t.co/TWEzD4zxKw https://t.co/C5O60ozWF5
17 hours ago

RT @VMwareEvents: Attend our VMware session at #F5Agility16 and you could win a FREE ticket to VMworld. Get details here:https://t.co/uUp1…
17 hours ago

Morning person? "How your morning mood affects your whole workday" https://t.co/Btob3qXKxv via @HarvardBiz
18 hours ago

"Government #cybersecurity problems can teach enterprises what to do" https://t.co/0oCcXfUHsv via @SearchSecurity
20 hours ago

"Your people will change your IT, even if you don’t!" https://t.co/bBp12BqzIl via @ITProPortal
22 hours ago

"How principals can fight back against cyber threats" featuring @F5NetworksAPJ: https://t.co/AyhCWOj7F5 via @TheEducatorAU #Cybersecurity
1 day ago