F5 Blog

 

Inteligencia sobre amenazas a la aplicación: ¿qué necesitan saber los CISOs?

by: Mike Convertino

Siempre menciono cuán importante es una fuerte gestión del riesgo para un CISO. Cuando se trata de riesgo, las aplicaciones de las que dependen los usuarios son una gran preocupación. En una encuesta de seguridad realizada en el...

Application Services Update: Sensitive Services may be Accessible

by: Lori MacVittie

It’s time again to dig into the application services organizations are actually using to make apps faster and safer. Of note this quarter again is a continuing rise in use of bot defense services. Security and performance application services...

Containers, APIs, and Security Rule Two

by: Lori MacVittie

#LockTheDoor already You would think by now that nothing about security would surprise me. Maybe it’s not that I’m surprised, but rather I’m disappointed. Disappointed in the failure to adhere to even the most basic of security principles. You...

Why Infrastructure Matters to Developers using Containers

by: Lori MacVittie

Today, one of the most frequently heard questions in the halls of an infrastructure provider is how to explain the value of that infrastructure to the developer community. Trouble is, most of the benefits of infrastructure are garnered after...

Why Should DevOps Practitioners Care about Per-App Architectures?

by: Lori MacVittie

Implied in that question is the conclusion that you should. For decades now we have been deploying the application services that comprise much of the production pipeline on shared platforms. Application services like load balancing, application...

Is there a Minimal Viable Deployment for NetOps

by: Lori MacVittie

Is it really all or nothing for network automation? Network automation – the practice of DevOpsing the production pipeline – is already in use by a significant percentage of organizations. While very few are fully engaged, the majority (77%...

The IP Address as Identity is Lazy Security

by: Lori MacVittie

It’s also largely ineffective The Internet works largely because of DNS. The ability to match a site with an IP address – needed to route requests and responses across the Internet – is what ultimately makes the Internet usable. The majority of...

“Props” to our Partners for the Strong Value Prop

by: Frank Strobel

One of the interesting things about the cyber security industry is the degree to which vendors essentially wind up on the same side.

Leaders and Laggards in Cloud: It’s all about the Application Services

by: Lori MacVittie

Sometimes I love reading commentary from El Reg on IT and technology. Delivered with just the right amount of bite, their bark is often right on target. Other times, though, they miss the mark in their biting commentary. In a diatribe on cloud...

Size Matters (But not that Much) in Network Automation

by: Lori MacVittie

So says the data. It would be easy to dismiss the importance of network automation by claiming that the size of your organization (and subsequently, demand) doesn’t warrant the admittedly significant effort required. After all, if there’s only...

Using F5 BIG-IP to Eliminate Tiers When Scaling Apps in Containers

by: Lori MacVittie

Or is that ‘tears’ of frustration? ¯\_(ツ)_/¯ Perhaps it’s both. There is a relationship between network and application architectures. Usually we like to talk about how changes and shifts in application architectures impact the...

Availability is a Diversion and We are Falling for It

by: Lori MacVittie

In a more balanced world, application users would have the same level of concern for the security of their data as they do for their access to it.

BIG-IP Cloud Edition: Making Sure Your App Party is Well Provisioned

by: Zach Westall

Zach Westall explains what intelligent traffic management, orchestration, and autoscaling have to do with a good party, wrapping up his series on BIG-IP Cloud Edition.

How to Prepare for Cloud-to-Cloud Migration

by: Lori MacVittie

Oh yes. It’s happening. Consider making it a part of your overarching cloud strategy to make the process less painful. What do the following have in common? Salmon, Canadian Geese, Monarch butterflies, and applications. If you guessed all of...

Software is Still Eating IT: Its Next Course is Application Services

by: Lori MacVittie

Back in 2015, I noted that Software was Eating IT. That was based on data culled from a variety of industry sources included RightScale, HBR, PWC, and others. From development to deployment to delivery, software was taking over everywhere. But...