Archivar Search Articles

Inteligencia sobre amenazas a la aplicación: ¿qué necesitan saber los CISOs?

by: Mike Convertino

Siempre menciono cuán importante es una fuerte gestión del riesgo para un CISO. Cuando se trata de riesgo, las aplicaciones de las que dependen los usuarios son una gran preocupación. En una encuesta de seguridad realizada en el...

“Props” to our Partners for the Strong Value Prop

by: Frank Strobel

One of the interesting things about the cyber security industry is the degree to which vendors essentially wind up on the same side.

Leaders and Laggards in Cloud: It’s all about the Application Services

by: Lori MacVittie

Sometimes I love reading commentary from El Reg on IT and technology. Delivered with just the right amount of bite, their bark is often right on target. Other times, though, they miss the mark in their biting commentary. In a diatribe on cloud...

Size Matters (But not that Much) in Network Automation

by: Lori MacVittie

So says the data. It would be easy to dismiss the importance of network automation by claiming that the size of your organization (and subsequently, demand) doesn’t warrant the admittedly significant effort required. After all, if there’s only...

Using F5 BIG-IP to Eliminate Tiers When Scaling Apps in Containers

by: Lori MacVittie

Or is that ‘tears’ of frustration? ¯\_(ツ)_/¯ Perhaps it’s both. There is a relationship between network and application architectures. Usually we like to talk about how changes and shifts in application architectures impact the...

Availability is a Diversion and We are Falling for It

by: Lori MacVittie

In a more balanced world, application users would have the same level of concern for the security of their data as they do for their access to it.

BIG-IP Cloud Edition: Making Sure Your App Party is Well Provisioned

by: Zach Westall

Zach Westall explains what intelligent traffic management, orchestration, and autoscaling have to do with a good party, wrapping up his series on BIG-IP Cloud Edition.

How to Prepare for Cloud-to-Cloud Migration

by: Lori MacVittie

Oh yes. It’s happening. Consider making it a part of your overarching cloud strategy to make the process less painful. What do the following have in common? Salmon, Canadian Geese, Monarch butterflies, and applications. If you guessed all of...

Software is Still Eating IT: Its Next Course is Application Services

by: Lori MacVittie

Back in 2015, I noted that Software was Eating IT. That was based on data culled from a variety of industry sources included RightScale, HBR, PWC, and others. From development to deployment to delivery, software was taking over everywhere. But...

Protecting the Identity Perimeter

by: Graham Alderson

What do terms like Identity Perimeter and Zero Trust actually mean for you? Graham Alderson takes a look in the context of F5's new Access Manager.

SSL/TLS: Visibility Isn’t Enough, You Need Orchestration

by: David Holmes

A full-proxy for both SSL/TLS and HTTP, SSL Orchestrator can make intelligent decisions to steer inbound and outbound traffic to service chains within the security stack. No other solution can do that.

F5 SSL Orchestrator Further Benefits Customers Thanks to Strong Partnerships

by: Frank Strobel

Frank Strobel highlights the role of F5's partner ecosystem in strengthening security, increasing scale and availability, and reducing operational costs.

Miners and Minions: Data Breaches aren’t the Only Thing that Cost You

by: Lori MacVittie

Sure, a data breach may cost more (at least right now) and it certainly forces your failure into the limelight (you gotta notify) but security can’t be just about data exposure. These days you only hear about a breach if there’s been a data...

Open Source Spotlight: F5 Eclipse Plugin for NetOps

by: Lori MacVittie

As a developer, my favorite editor for writing code is vim. I know, I know. But it’s fast, I can get around in it, and it isn’t emacs. (Yeah, I went there.)

Pay-As-You-Go BIG-IP VE and Advanced WAF Now Available for Azure Government

by: Tom Atkins

Perfect for development and test purposes, these instances provide true cloud-native operational flexibility with no long-term commitments or contracts.