F5 Blog


F5 Anti-Bot Mobile SDK Extends Bot Protection to Mobile Apps

by: Byron McNaught

Byron McNaught looks at the ways back-end mobile API components can be exposed to automated attacks such as content scraping, denial of service, and a wave of other new threats (and what you can do about it).

F5 is an Initial Launch Member of Microsoft’s Intelligent Security Association

by: Tom Atkins

The security of applications, data, and networking infrastructure is now more critical than ever, given the continued evolution of cyberattack vectors and the frequency at which they occur. It is predicted that by 2021 cyber-crime will cost...

Load Balancing Apps and APIs: Algorithms versus Architecture

by: Lori MacVittie

For the most part, scaling apps and APIs are pretty much the same thing. Both require some sort of load balancer – usually a proxy – and are required to distribute requests across a pool of resources. But there is a fairly significant difference...

IT Automation is Strategic

by: Lori MacVittie

What if I told you that “mainframes host more transactions daily than Google (1.3 million/second on CICS vs. 68,542/second on Google), including 55 percent of all enterprise transactions.” (Forbes) Would you be shocked? You shouldn’t. While...

Azure Stack Support – Expanding F5’s Multi-Cloud Ecosystem

by: Tom Atkins

F5 empowers Azure users to further enhance the hybrid capabilities of architectures through replication of supporting application services across environments.

NetOps Take Note of SRE Focus on MTTR to Realize Availability

by: Lori MacVittie

Site Reliability Engineer (SRE) is a relatively new role – usually within engineering or operations – focused on maintaining, unsurprisingly, site reliability. That generally means availability of applications, but it also includes performance....

See How to Route Apps across Multi-Cloud Containers with F5 and Red Hat

by: Lori MacVittie

F5 is at Red Hat Summit this week demonstrating multi-cloud capabilities with OpenShift Containers, Ansible automation, and Aspen Mesh / Istio insight.

Open Source Spotlight: URL rewrite and Helm charts

by: Lori MacVittie

Lori MacVittie looks at how technologies like F5 Container Connector help navigate the routes between modern environments and traditional networking.

How IoT can compromise network integrity

by: Bernd Kunze

The IoT (Internet of Things) is shaking up the networking space and paving the way for machine-to-machine (M2M) communication and automated processes.

Why is a Declarative Model Important for NetOps Automation?

by: Lori MacVittie

Lori MacVittie: If you’re going to automate all the things, go declarative.

Incredible security content at F5’s ANTICIPATE 2018 event

by: David Holmes

“Guys, did you hear? The team in ASEAN is building a security conference to rival the best in business. They call it ANTICIPATE!” That’s the rumor going around the F5 world and its true. We’re aiming high in Singapore to build a world-class...

What is Infrastructure as Code for NetOps?

by: Lori MacVittie

As DevOps approaches creep over the wall into network operations, it drags with it new terminology. These colloquialisms can be confusing to NetOps who’ve not encountered them before, and can befuddle IT executives who are being pressured to...

BIG-IP Cloud Edition: Per-app Security and Scale

by: Lori MacVittie

There is a new network coming to a data center near you. And by ‘near you’ I mean within walking distance of your desk. Whether we like it or not, pressure from digital transformation continues to drive development of new apps at a frantic pace....

Stop DDoS Attacks Before They Deny Your Profitability

by: Frank Strobel

The recent State of the Internet/Security Report from Akamai shows that the number of Distributed Denial of Service (DDoS) attacks continues to increase—rising 14% over last year. This might not seem like a huge change, but it is on top of the...

Eight Reasons Why the Future of Scaling Containers is Service Mesh

by: Lori MacVittie

Microservices are great for development velocity, but the complexity in these architectures lies in the service-to-service communication that microservices depend on. There are, right now, at least three different architectural options for...