Blog: Authentication in Context – Add the Right Controls for Every User

Applications have escaped from the data center. Your business may have applications running in many different environments serving users who switch between locations and devices rapidly. As your...

Rigidity of the Org, not Hardware, is Holding up App Deployments

The solidification of the divide between traditional IT and a more agile, DevOps-driven IT is resulting in the emergence of essentially a two-tiered, data center architecture. This should not be...

SSO with BIG-IP & VMware Workspace ONE

At VMworld Europe 2016, VMware & F5 announce new collaboration that enables simple and secure single sign-on to all business apps.

Read More >

Blog: Get Off of My Cloud!

The latest from F5's Jay Kelley includes a list of considerations when deploying a new identity and access solution for Microsoft Office 365.

Read More >

Blog: Managing Identity in SaaS Applications

The rise of business applications delivered “as a Service” can be great for cost savings and operational efficiency. After all, who really wants to spend hours and hours implementing a new HR or...

Blog: Colo Cloud – The Best of Both Worlds

Cloud, compliance, and certifications. It's a complex world out there.

You want big data? You can’t handle big data…

Current infrastructure cannot handle the projected explosion of data, connections, and traffic as the world moves into the digital economy. We talk about the digital economy but we don’t often...

Read More >

Blog: Managing Identity and Access in a Multi-Cloud World

F5's Robert Haynes discusses application security in the cloud and the importance of a single source of truth.

Read More >

Blog: Bug Bounty Programs Only Half the Battle

My father was a fan of westerns. And not just the Lone Ranger but all the old, black and white westerns. The ones with Gene Autry and Smiley Burnette and John Wayne. Bonanza, too, was a must if it...

F5 Blog: An Office in the Clouds

A look at one of the most popular business productivity software suites ever, the keys to its longevity, and some of its challenges.

F5 Labs: Mirai – The IoT Bot That Took Down Krebs and Launched a Tbps DDoS Attack on OVH

The “Mirai” botnet has infected hundreds of thousands of Internet of Things (IoT) devices, specifically security cameras, by using vendor default passwords for Telnet access. This IoT botnet...

Read More >

Are Mobile Operators Ready for the Connected Car?

A look at the promise of IoT on the road (as well as a few cautions).

Read More >

Blog: Don’t Sacrifice Services for Speed

No, not that kind of speed. The other kind of speed. Velocity, the speed with which applications can be developed and released into production, is a common driver of organizations adopting agile...

Stop. Just Stop. HTTPS is not faster than HTTP.

Yes, Lori has been reading the Internet again. And what she’s been seeing makes baby Lori angry. It also makes this former test designer and technology editor cry. Really, I weep at both the...

F5 a Leader in Gartner Magic Quadrant for Application Delivery Controllers for 10th Consecutive Year

Aug. 31, 2016 -- F5 celebrates a decade in the Leaders quadrant, positioned as highest in execution by prominent industry analysts

F5 joins Docker Partner Program to secure, scale & speed up Containerized apps

To say that Docker’s container technology is experiencing explosive growth and adoption is not mere hyperbole or wishful thinking on the part of its highly vocal advocates. Nary a day goes by that...

Blog: The Answer to IT’s Kobayashi Maru is Private Cloud

In case you aren’t familiar with the concept: The Kobayashi Maru is a test in the fictional Star Trek universe. It is a Starfleet training exercise...

F5 DevCentral Blog: Risk Remediation and the Power of iRules

Network and applications attacks are everywhere. The first line of defense is often your BIG-IP device.

Case Study: The unbelievable Machine Company Improves Cloud & Security Services with F5

Case study video: Alberta Motor Association lifts and shifts on-premises security to the AWS cloud with F5

Partner blog: Achieving business transformation with Cisco ACI, F5 BIG-IP, and BIG-IQ

Brief customer profiles from the US & Asia on F5/Cisco deployments

Read More >

"Regaining control in the #cloud" by @lmacvittie: via @NetworkComputin
1 hour ago

#LightboardLessons: "#DNS scalability & security" with @psilvas: via @devcentral
4 hours ago

Alberta Motor Association (@AMAcommunity) partners with F5 to secure #cloud apps:
6 hours ago

"#NFV helps telcos save money on #WAN infrastructure" via @ComputerWeekly
8 hours ago

"Prescribing the right medicine for IT in pharmacies" via @ZDNet
19 hours ago

"#CIOs move more dollars to digital transformation" via @CIOonline
20 hours ago

RT @HelloLine2: Line2 loves @F5Networks! (And F5 gear)
21 hours ago

October is National #Cybersecurity Awareness Month, how are you becoming more #CyberAware?
22 hours ago

Bug bounty programs are on the rise, but @lmacvittie says they're only half the battle:
23 hours ago

"F5 now available in Microsoft @Azure’s US Gov #Cloud" via @msdev
1 day ago

"Single sign-on (SSO) to legacy apps using F5 BIG-IP & @VMware Workspace ONE" via…
1 day ago

"Building custom vRO workflows for F5 BIG-IP" featuring @bluemedora: via @vmwareblogs
1 day ago

Why government agencies would do well to focus on cyber fundamentals. via @Carahsoft #NCSAM
1 day ago

"How #cloud computing can transform the pharmaceutical industry" via @InformationAge
1 day ago