Archivieren Search Articles

Open Source Spotlight: OpenStack LBaaS Enhanced Service Definitions

by: Lori MacVittie

One of the often mentioned benefits of cloud – private or public, on-prem or off – is speed. Speed to provision, speed to scale, speed to ultimately get an app delivered to the users who desire or demand its functionality. To get that speed, much...

Automation, Clouds, and Continuous Delivery: Learning What to Learn

by: Robert Haynes

F5's Robert Haynes gives a quick run-down of automation topics to consider (and where to start).

Why CVEs Should Be Given Priority One for Resolution

by: Lori MacVittie

When considering vulnerabilities, remember application security is a stack. You may have heard me say this before, but sometimes we need a reminder that modern applications are never deployed alone.

Scary Candy Week: KRACK and ROCA

by: David Holmes

What You Need to Know and What You Need to Do – It’s not a coincidence that Halloween falls in October. We humans have a heightened fear perception this time of year; it’s some kind of vestigial response to the shortening of days.

Where does a WAF fit in the data path?

by: Lori MacVittie

The data path contains multiple insertion points at which a WAF can be deployed. But that doesn’t mean every insertion point is a good idea.

How Container Orchestration Environments Impact Health Monitoring

by: Lori MacVittie

At the heart of availability is monitoring. Every load balancer – before it chooses a target resource – has to know whether that resource is actually available or not. Otherwise, what’s the point? In environments where resources have lifetimes...

How F5’s WAF Earned its AWS Security Competency

by: Tom Atkins

F5's Tom Atkins takes a closer look at the company's recently achieved AWS milestone, supporting those aiming to mitigate attacks on applications deployed in the public cloud.

Dear NetOps: Security Rule Zero Applies to You, Too

by: Lori MacVittie

Okay, NetOps. As you’re getting all automated up and scripting your hearts out, it’s time for a gentle reminder about security. I’m not talking about firewalls and WAF or other security services you may be responsible for.

Taking Customers to AWS, Through Our Channel

by: David Helfer

SVP of Worldwide Channels David Helfer highlights F5's selection for the AWS Channel Opportunity Registration Program and just-achieved AWS Security Competency.

F5 BIG-IP Availability on IBM Cloud for VMware Solutions

by: Craig Scarborough

For most enterprises, the concept of cloud is well in the process of crossing the “chasm” from early adoption to early majority.

Automation: Managing F5 BIG-IP Configurations Using Puppet

by: Mani Gadde

Most of us are still learning new ways to optimize continuous deployments and reduce release cycles. In complex environments this often includes automating, streamlining, and eliminating costly, wasteful processes.

Example-driven Insecurity Illustrates Need for WAF

by: Lori MacVittie

Learning online is big. Especially for those who self-identify as a developer. If you take a peek at Stack Overflow’s annual developer survey...

Solace and F5: Partnering for Better IoT

by: Frank Strobel

In addition to being equipped to handle huge numbers of devices and massive amounts of data traffic, IoT deployments have to be built for some unique ways of communicating.

Making Multi-Cloud Manageable: F5 Application Connector Now Available for Microsoft Azure

by: Lori MacVittie

When using multiple public clouds to host applications, you’ve still got to manage those apps and connect them to a secure inbound path.

Bots are the Bane of Turing Security Test

by: Lori MacVittie

Bots are cool. Bots are scary. Bots are the future. Bots are getting smarter every day. Depending on what kind of bot we’re talking about, we’re either frustrated or fascinated by them.