Network and applications attacks are everywhere. The first line of defense is often your BIG-IP device.
No, not that kind of speed. The other kind of speed. Velocity, the speed with which applications can be developed and released into production, is a common driver of organizations adopting agile...
To say that Docker’s container technology is experiencing explosive growth and adoption is not mere hyperbole or wishful thinking on the part of its highly vocal advocates. Nary a day goes by that...
A look at one of the most popular business productivity software suites ever, the keys to its longevity, and some of its challenges.
Yes, Lori has been reading the Internet again. And what she’s been seeing makes baby Lori angry. It also makes this former test designer and technology editor cry. Really, I weep at both the...
In case you aren’t familiar with the concept: The Kobayashi Maru is a test in the fictional Star Trek universe. It is a Starfleet training exercise...
"That's where F5 really helped us out, enabling [us] to expand into the cloud and rapidly deploy new technologies."
Aug. 31, 2016 -- F5 celebrates a decade in the Leaders quadrant, positioned as highest in execution by prominent industry analysts
Brief customer profiles from the US & Asia on F5/Cisco deployments
You might have heard any number of folks here at F5 quip, “Identity is the new firewall.” That might sound, well, soundbitey but there’s a whole lot wrapped up in that simple statement. A whole lot...
Using traditional security methods to secure an increasingly cloud-first, mobile-centric world is insane. It hasn’t worked, and it won’t work. August 4, 2016 – Network World
There has emerged two distinct models of “going cloud.” The first, most obvious, is the native approach. Native meaning new, either greenfield or rewritten. The native approach encourages a narrow...
Enterprise security specialist F5 and the Ponemon Institute teamed up for a comprehensive study on application-centric security. Aug 22, 2016 – eWeek
Conducted in partnership with the Ponemon Institute, the report surveys 605 IT and IT security professionals about their approach to protecting applications...
The Internet of Things (IoT) continues to be a topic of interest. And while consumer oriented gadgets and gizmos tend to make headlines, it’s the behind the scenes, in the data center prep work...
For the past few years we (as in the corporate We) have delved into the data center to discover how and why and where enterprises deploy and deliver applications with our State of Application...
The central computer system of the High Energy Accelerator Research Organization (KEK) underpins the organization’s diverse accelerator science research programs. KEK chose F5’s web application...
Mobile devices are rapidly becoming the instrument of choice for digital users, impacting the financial sector as well. The new generation needs banking to be mobile-friendly, while also overcoming...
Service providers are challenged to scale networks to meet demand and maintain profitable business models. As the networks scale up and out...
Have you visited our Newsroom recently? Catch up on all things F5: https://t.co/TR9hrVoEV5 https://t.co/gAzeh029e1
5 minutes ago
#LightboardLessons: "Secure & Optimize VDI" with @psilvas: https://t.co/kajR1bkIxT @vmwarehorizon https://t.co/AQAq1VzhFZ
1 hour ago
Moving to the #cloud? @lmacvittie reminds you, "Don’t sacrifice services for speed": https://t.co/ecuvVypcQ1 #DevOps https://t.co/RYlafUdNGx
3 hours ago
Mark your calendar for our upcoming #webinar with @RedHatTelco: https://t.co/NAmrCQGIJX #NFV https://t.co/9ryRs06N1C
5 hours ago
"I got 99 problems, but #SWEET32 isn't one" by @dholmesf5: https://t.co/7XwjOjdZfl via @SecurityWeek #SSL https://t.co/PEPnpLiwK6
7 hours ago
"How to implement an effective #BYOD policy" https://t.co/FfutQzFb9s via @NetworkWorld
8 hours ago
"Banks move to #cloud for simplification, savings and a clearer view of costs" https://t.co/44lwNeObyc via @Forbes
10 hours ago
"Why enterprise IT still matters" https://t.co/XfPrAH1fvo via @CIOInsight
21 hours ago
"Your users have porous #passwords? Blame yourself, IT." https://t.co/WHG3H4hztc via @Computerworld
23 hours ago
We've had a busy week at #MSIgnite! Thanks to all those who stopped by the F5 booth for… https://t.co/aPc0PMaVrB
1 day ago
[Video] @nuagenetworks VSP and F5 BIG-IP Virtual Edition demo in Red Hat #OpenStack environments: https://t.co/OXZGaIwdfa #cloud
1 day ago
How are #IoT devices used in #DDoS attacks? Read our F5 Labs Threat Analysis Report: https://t.co/jRgcfN6AMa https://t.co/YwNir0jWXa
1 day ago
[Solution Brief] Dynamic service chaining with @F5Security #SSL Orchestrator: https://t.co/sSuk6Dvz6N https://t.co/EQyLRg6OJZ
1 day ago
"How can you protect what you didn't know was worth stealing?" by @garynewe: https://t.co/HlDMUhR8di via @HuffPostUKTech #Cybersecurity
1 day ago
Last chance #MSIgnite, visit the F5 Networks booth - #1618 - for demos on @Azure Security Center & @Office365. https://t.co/Mxwpo8emID
1 day ago
Back to the Newsroom Home Page