Archivieren Search Blogs

Containers, APIs, and Security Rule Two

by: Lori MacVittie

#LockTheDoor already You would think by now that nothing about security would surprise me. Maybe it’s not that I’m surprised, but rather I’m disappointed. Disappointed in the failure to adhere to even the most basic of security principles. You...

Why Should DevOps Practitioners Care about Per-App Architectures?

by: Lori MacVittie

Implied in that question is the conclusion that you should. For decades now we have been deploying the application services that comprise much of the production pipeline on shared platforms. Application services like load balancing, application...

The IP Address as Identity is Lazy Security

by: Lori MacVittie

It’s also largely ineffective The Internet works largely because of DNS. The ability to match a site with an IP address – needed to route requests and responses across the Internet – is what ultimately makes the Internet usable. The majority of...

“Props” to our Partners for the Strong Value Prop

by: Frank Strobel

One of the interesting things about the cyber security industry is the degree to which vendors essentially wind up on the same side.

Leaders and Laggards in Cloud: It’s all about the Application Services

by: Lori MacVittie

Sometimes I love reading commentary from El Reg on IT and technology. Delivered with just the right amount of bite, their bark is often right on target. Other times, though, they miss the mark in their biting commentary. In a diatribe on cloud...

Using F5 BIG-IP to Eliminate Tiers When Scaling Apps in Containers

by: Lori MacVittie

Or is that ‘tears’ of frustration? ¯\_(ツ)_/¯ Perhaps it’s both. There is a relationship between network and application architectures. Usually we like to talk about how changes and shifts in application architectures impact the...

Availability is a Diversion and We are Falling for It

by: Lori MacVittie

In a more balanced world, application users would have the same level of concern for the security of their data as they do for their access to it.

How to Prepare for Cloud-to-Cloud Migration

by: Lori MacVittie

Oh yes. It’s happening. Consider making it a part of your overarching cloud strategy to make the process less painful. What do the following have in common? Salmon, Canadian Geese, Monarch butterflies, and applications. If you guessed all of...

F5 SSL Orchestrator Further Benefits Customers Thanks to Strong Partnerships

by: Frank Strobel

Frank Strobel highlights the role of F5's partner ecosystem in strengthening security, increasing scale and availability, and reducing operational costs.

SSL/TLS: Visibility Isn’t Enough, You Need Orchestration

by: David Holmes

A full-proxy for both SSL/TLS and HTTP, SSL Orchestrator can make intelligent decisions to steer inbound and outbound traffic to service chains within the security stack. No other solution can do that.

Protecting the Identity Perimeter

by: Graham Alderson

What do terms like Identity Perimeter and Zero Trust actually mean for you? Graham Alderson takes a look in the context of F5's new Access Manager.

Miners and Minions: Data Breaches aren’t the Only Thing that Cost You

by: Lori MacVittie

Sure, a data breach may cost more (at least right now) and it certainly forces your failure into the limelight (you gotta notify) but security can’t be just about data exposure. These days you only hear about a breach if there’s been a data...

What Makes F5 a Leader in WAF?

by: Brian A. McHenry

Brian McHenry looks at F5's diversity of WAF services and web application security capabilities in the context of a recent analyst report.

Big data doesn’t lie but the people who enter it might

by: Lori MacVittie

There’s an old business axiom we all know that  goes like this: The customer is always right. In this digital economy, it turns out that axiom has to change to read: The customer’s data is always right. Let me illustrate with a little...

Conquer Your Cloud Security Concerns with F5 Advanced WAF on AWS and Azure

by: Tom Atkins

These virtual editions protect applications and data with complete feature parity across on-premises and multi-cloud deployments.