Published: Jan 5, 2023
Today's enterprise architectures lack the necessary factors of agility, scale, security, and observability, which are key to driving technological change, but these six core capabilities will help businesses manage risk and challenges throughout their digital transformation.
Published: Dec 21, 2022
Tech prediction roundup for 2023, from cloud computing trends to cybersecurity threats.
Published: Aug 11, 2022
Read how the Threat Stack DevSecOps team increased the stability and improved operational efficiency of the Threat Stack Data Platform by leveraging Apache Spark and Amazon EMR.
Published: Jun 27, 2022
F5 announces our 2022 Tech for Good grant recipients—25 NGOs working to build more vibrant communities around the globe.
Published: Jun 6, 2022
Need compliance help? This video explains how supervised machine learning / deep learning for cloud security gives high-efficacy alerts and intrusion detection for compliance audits while avoiding false negatives/positives. No alert fatigue for DevSecOps teams.
Published: May 24, 2022
Christine Puccio looks at market and industry trends that point to the value F5 creates in broadening the ways customers can leverage popular commercial marketplaces to procure, consume, and expand the use of solutions from the company’s growing software and SaaS portfolio.
Published: May 23, 2022
Today, security must fulfill multiple roles: enabler of digital transformation, steward of customer trust, and bulwark of organizational reputation. As an essential element of business success, aligning a company's perception of security as a mindset instead of just a feature represents a cultural change that requires time and effort.
Published: May 16, 2022
The need for multi-cloud and edge deployments stems from the growing digital landscape and accelerating business requirements.
Published: May 11, 2022
To help address security needs amid increasing cyberattacks and global supply chain shortages, F5 has teamed with Amazon Web Services (AWS) to offer High Performance Virtual Editions of BIG-IP SSL Orchestrator deployed on AWS. Catherine Newcomb details why SSLO Orchestrator on AWS may be the best choice for you.
Published: Mar 22, 2022
If you’ve tried to buy a car, washing machine, or laptop in the last six months, you know that the global chip shortage is lengthening lead times for consumer hardware pretty much across the board. And the world of IT (including F5) is unfortunately no exception. However, F5 can help you adapt quickly to related supply chain challenges affecting your business with innovative tools like the F5 Journeys Migration Utility.
Published: Feb 15, 2022
The modern application landscape continues to evolve into a world of multi-cloud, microservices, and APIs coexisting with legacy, data center-based apps. Security practices are far more challenging because of process complications and increased time pressures on app development. Organizations need to simplify their approach, with F5 Distributed Cloud Services poised to help.
Published: Jan 5, 2022
Rather than a one-time lift-and-shift, deploying to the cloud has become another option in the app deployment lifecycle, and applications are evolving to make better use of resources by being “cloud-native.” As organizations are increasingly adopting multiple clouds and mutli-cloud, it’s important to ask what other aspects also need to change in the apps and operations realm.
Published: Dec 17, 2021
What do you do when SD-WAN over the Internet isn’t enough? Move that automation to a physical network and connect it everywhere.
Published: Dec 16, 2021
As December comes to a close, tech pundits dust off their crystal balls and share their predictions for the coming year. For Peter Silva's annual list, he's compiled a collection of what the industry is saying (and anticipating) for 2022.
Published: Dec 14, 2021
Vulnerabilities, exploitations, mitigation, and remediation are always disruptive, and it’s F5’s mission to do what we can to provide expertise and support for customers. Teams across F5 have been actively working on tools and guidance to help already overburdened application and security teams mitigate this significant industry threat.
Published: Dec 9, 2021
As distributed modern apps become more common, so will app to app connections, such as hybrid cloud, cloud to cloud, and edge to cloud. Scalable architectures will require a method of dealing with IP overlap that can cleanly be automated.
Published: Dec 2, 2021
Companies cite many reasons for why public cloud environments are appealing: scalability, a variety of consumption options that can yield cost savings, and improved agility, to name a few. However, whether an organization is migrating existing applications, building a scaled operation for new applications hosted in the public cloud, or both, the architectural approach taken can make or break the business case.
Published: Nov 29, 2021
Microservices are the norm in today’s software deployment world. As applications are decomposed into different services, the number of applications that an organization needs to deploy increases. Often the number of services increases hundreds or thousands of times. If I have one hundred applications today, this often becomes thousands of microservices.
Published: Nov 29, 2021
Back in the day enterprise architecture was physical and singular, conveniently located in the one place, which could easily be managed and made secure.
Published: Nov 15, 2021
Staying ahead of the growing sophistication of criminal organizations and their attacks is difficult, especially with staffing and resources in short supply. It’s time to look inward and outward. Bringing together cybersecurity and fraud management into an integrated team and leveraging external expertise provides compelling benefits.
Published: Nov 8, 2021
Services like AWS Transit Gateway have significantly simplified cloud networking. F5's Volterra further extends the concept of multi-tiered hub-and-spoke networking to the global level, effectively functioning as a multi-cloud transit gateway to connect public and private clouds.
Published: Oct 26, 2021
How to achieve operational freedom by mixing and matching cloud providers and app services
Published: Oct 7, 2021
Managing and securing workloads is a complex task as enterprises move towards a
connected cloud strategy. Find out how F5 is meeting the demand for a new approach to multi-cloud networking.
Published: Aug 11, 2021
How Threat Stack's User Interface and alert context changes can reduce key security metrics like mean-time-to-know (MTTK)
Published: Jul 21, 2021
The first in a two-part series around how Threat Stack approaches its UI design for cybersecurity use cases.
Published: Jul 8, 2021
The Microsoft Partner of the Year Awards honor companies that demonstrate excellence in innovation and implementation of customer solutions based on Microsoft technology. This is an especially meaningful award for us because it recognizes F5’s marketplace sales and marketing expertise, as well as consistent, high-quality, predictable delivery to marketplace customers.
Published: Jul 7, 2021
The Dark Night. Lord of the Rings: The Two Towers. Thor: Ragnarök. The Empire Strikes Back—sequels are frequently better than the originals. Sometimes writers need an additional opportunity to build out a fictional world or refine plots and characters. Similarly, in technology it seems the story is never quite over, with solutions like F5’s SSL Orchestrator well positioned to take advantage of industry narrative developments.
Published: Jun 24, 2021
Combining the power of Threat Stack and Squadcast will help you quickly detect and respond to security and compliance risk across your cloud workloads, making an enormous contribution to drive down KPIs such as MTTK and MTTR.
Published: May 19, 2021
As 5G becomes more widespread, an underlying question remains: How will you be able to monetize your investments? Service providers will need modern edge strategies not only to attract different enterprise verticals, but also to deliver on the promise of 5G—increased bandwidth and lower latency close to end users.
Published: May 17, 2021
BIG-IP APM and Azure AD combine to enable seamless, secure access to all applications, regardless of where they’re hosted—in the public cloud, as native cloud or SaaS applications, on-premises, in a data center, or in a private cloud. The integrated solution allows employees to securely access all authorized applications, whether those applications support modern authentication standards and protocols or classic authentication methods, such as Kerberos or header-based methods.
Published: May 11, 2021
It's an all too common scenario where you're not able to login to an e-commerce site without jumping through hoops (forgotten password, reauthentication, email verification—but which email?). This post explores strategies organizations are implementing to spare authentic human users from all this friction, and avoid the associated lost revenue.
Published: May 10, 2021
Cybercriminals targeting the financial services sector are focusing more of their attacks on application programming interfaces (APIs). At the same time, different development teams working on multiple applications often use disparate tool sets, pointing to the increasing importance of industry standards. F5 works closely with financial services customers worldwide to implement and secure the APIs driving open banking.
Published: May 6, 2021
Encryption, while helpful in protecting users’ data privacy, can create serious risks for enterprises if not properly decrypted and inspected for malicious payloads. While no-cost and readily available TLS certificates allow application hosts to cheaply protect their users’ data privacy, bad actors can also hide malware behind a certificate. And it’s becoming increasingly easier for them to do so.
Published: Apr 22, 2021
As enterprises pursue DNS solutions capable of supporting adaptive applications, they look for solutions that match their need for automation, speed, and ability to respond to infrastructure changes in seconds rather than hours. F5 Cloud DNS promotes modern DevOps practices, helping to speed new application rollouts by adding DNS updates seamlessly into surrounding process elements.
Published: Apr 21, 2021
Case studies how cloud-native security + compliance improves ROI: Save time plus increase revenue and productivity
Published: Apr 20, 2021
Every organization wants the same thing from their applications: the best performance for their users and exceptional security to prevent losses and harm. It's a simple concept, but delivering comprehensive security that doesn't slow the speed of innovation isn't easy given the complexities of the modern digital business.
Published: Apr 12, 2021
Digital transformation and the associated data generation are threatening to overwhelm the systems and companies that rely on data to create value. Accordingly, organizations are looking for more efficient, modern computing architectures that can support multi-tenancy and deliver applications at data center scale with all the necessary levels of performance and security.
Published: Apr 8, 2021
In an exciting proof-of-concept (POC) project, F5 partnered with SoftBank Corp. to demonstrate the viability of Multi-access Edge Computing (MEC) in a satellite communications environment, utilizing F5 caching technology to implement MEC and broadcast content in bandwidth-limited communications conditions.
Published: Mar 24, 2021
We are living in an unprecedented time. Technology innovations routinely disrupt existing business models, and in some cases, completely replace existing industries—continuously and fundamentally changing the way we live and interact with each other. This post identifies three areas where AI is currently having a major impact on the enterprise.
Published: Mar 22, 2021
Ian Jones explores how we’re adapting to the hybrid world of traditional and remote IT professional services.
Published: Mar 19, 2021
The fight for anti-racism in support of our friends, family, and coworkers of Asian and Pacific Islander ancestry is part of a much bigger battle. We are fighting for a world that is radically inclusive—where we, as a global community, don’t just tolerate differences, we celebrate them.
Published: Mar 17, 2021
Keiichiro Nozaki takes a closer look at regional results and variations among the responses received for F5's 2021 State of Application Strategy report.
Published: Mar 9, 2021
IBM Cloud Satellite is designed to bring cloud services to where clients’ data already resides—and help them bridge to where they want to go. This aligns with F5’s ambitions for Edge 2.0 and our vision of distributing applications—at the data center, in the public cloud, and at the edge—to help assure a seamless, consistent, and secure user experience.
Published: Mar 2, 2021
Every organization is now in the digital experiences business—meaning that good UX, high performance, zero downtime, secure transactions, and a high degree of personalization are no longer differentiators; they're expected.
Published: Feb 22, 2021
QUIC has broad industry support and the potential to be the basis of most applications that deliver business value over the internet. Anyone delivering applications over the internet should start thinking about how their operations should change to reflect the new threats and opportunities that these protocols bring.
Published: Feb 12, 2021
According to the Chinese zodiac cycle, the year of the (Metal) Ox has arrived. As the second animal in the zodiac, the stabilizing influence of the Ox points to a calmer atmosphere. Peter Silva gives his thoughts on the months to come and what they might hold for the industry.
Published: Feb 8, 2021
F5’s completion of its acquisition of Volterra marks the beginning of the next phase of edge computing, ushering in the Edge 2.0 era. We envision that in the Edge 2.0 era, digital business in every industry sector will adopt edge computing platforms to deliver applications and to process and analyze data. The edge platform will be an essential component of the user experience for all digital services.
Published: Jan 15, 2021
During the last year and half, we have been working with a few major global banks to test and evaluate our solutions. To be honest, we were approached by these banks as they started to see the need to create an edge strategy and also start to think about consuming multiple clouds (buzz word – ‘Multi-cloud’), mostly in a private way.
Published: Jan 7, 2021
Avec Volterra, F5 va transformer la manière dont les clients offrent des expériences numériques et relever les défis de sécurité et de fourniture des applications que nous constatons dans les technologies edge existantes. F5+Volterra crée un nouveau paradigme qui unifie la sécurité et les applications à travers le cloud et la périphérie avec une cohérence globale.
Published: Dec 10, 2020
Kubernetes may be free to download and run, but it’s hardly free of cost to own. Like other major open source platforms that are “free” only in a simplistic sense, Kubernetes will almost certainly cost you money to deploy and operate.
Published: Nov 26, 2020
Kubernetes is an open source platform. You might think, then, that it's a vendor-agnostic platform, meaning that you can easily move from one Kubernetes implementation to another.
Published: Nov 19, 2020
You can barely read a tech blog these days without finding an article that sings the praises of multi-cloud architectures. There are good reasons for that: multi-cloud provides a range of benefits, from cost-savings to increased reliability and beyond.
Published: Oct 29, 2020
Today we are very happy to announce that Volterra is able to serve its customers with PCI DSS Level 1 compliant services. Our entire team has achieved a tremendous amount of work over the past few months to deliver this capability.
Published: Sep 21, 2020
Early this year, our team was asked to augment our existing security tools and software dev+test practices for PCI-DSS and SOC-2 compliance. One of the key areas we had to augment was vulnerability scanning for our K8s-based microservices and a couple of monolithic services.
Published: Aug 26, 2020
Over the past decade, the quest for faster development cycles, high availability, selective on-demand scaling, and decoupling in general has steered technology-driven organizations to the microservices architecture.
Published: Aug 4, 2020
Learn how Threat Stack’s new Fargate support can augment your existing AWS security controls.
Published: May 14, 2020
How many times have you found yourself emailing a sensitive file to your accountant, lawyer, friend, relative, or co-worker and immediately feeling remorseful? Or perhaps you uploaded the file to some cloud storage provider and emailed or Slacked the link.
Published: Feb 25, 2020
In this post, Blaine Connaughton uses Threat Stack’s data portability feature to dive deeper into security analytics using Jupyter PySpark notebooks.
Published: Feb 20, 2020
Threat Stack’s latest Threat Intelligence Report and live attack simulation show how Threat Stack Cloud SecOps Program analysts investigate the downstream actions of automation tools when conducting forensics that require user attribution.
Published: Feb 18, 2020
Andrew Warren discusses best practices for writing automated system integration tests using containers in order to effectively gray box test microservices.
Published: Jan 21, 2020
Threat Stack has introduced additional runtime attack detection to its Cloud Security Platform to further protect web application, microservice, and API workloads against path or directory traversal attacks, and remote code execution.
Published: Jan 9, 2020
Drawing on lessons learned from its successful 2017 and 2018 Type 2 SOC 2 examinations, Threat Stack further optimized its people, processes, and tools to accommodate scope changes and successfully complete its 2019 Type 2 SOC 2 examination with zero exceptions.
Published: Dec 26, 2019
The use of APIs have the potential to be transformative by enabling new business models and revenue streams. Implemented without adequate guardrails, however, APIs also have the potential to disrupt and put businesses at risk. Concluding his two-part blog series, Mark Campbell outlines steps that organizations can take to help address the industry’s present API security gaps.
Published: Dec 19, 2019
The transformation from monolithic applications to ecosystems of microservices has made APIs a strategic and critical element of business success. APIs are typically designed to be externally exposed and accessed by business partners, customers, and microservices. Just like web applications, though, APIs can be a doorway for unauthorized access to sensitive data. And as with many technology advances, security considerations often trail behind.
Published: Dec 18, 2019
At Volterra, the SRE team’s job is to operate a global SaaS-based edge platform. We have to solve various challenges in managing a large number of application clusters in various states (i.e. online, offline, admin-down, etc.) and we do this by leveraging the Kubernetes ecosystem and tooling with a declarative pull-based model using GitOps.
Published: Dec 12, 2019
Omada Health uses Threat Stack’s Cloud Security, Oversight, and Insight Services to provide data and systems security, and HIPAA compliance.
Published: Dec 11, 2019
A good way to think about how digital transformation and DevOps practices are influencing app deployment is to picture an application factory. Instead of handcrafted policies and manual review processes, network and security experts need to define reusable policies for developers to deploy with their applications as part of an automated deployment pipeline.
Published: Dec 10, 2019
F5's Peter Silva: As each year comes to a close, tech pundits blow the dust off their crystal balls and share their predictions for the coming year. As someone who has (let's generously say) repurposed others' since 2012 rather than thinking up my own, here's what some of the smart folks I read expect to happen...
Published: Dec 5, 2019
The future of security rests on telemetry that is more than technical data points picked out of packets. It requires a holistic view of interactions from client to application to behavior. Machine learning requires enormous amounts of data to establish and recognize patterns. This is why programmable proxies are such a critical part of an advanced security approach.
Published: Dec 4, 2019
For many enterprises, new working patterns need to coexist alongside applications, teams, and technologies that have taken root over time and are now firmly embedded into the fabric of IT delivery. Zach Westall takes a closer look at how F5 and BIG-IP help DevOps teams (and the groups they work with) deploy services throughout the application delivery stack in support of CI/CD practices.
Published: Nov 12, 2019
At NGINX Conf 2019, we conducted more than 50 recorded sessions covering various subjects. This blog shares takeaways from one of the hottest topics in the industry: Site Reliability Engineering (and also the related topic of Chaos Engineering).
Published: Nov 12, 2019
Business Needs a Smarter Mousetrap to Catch Next-Generation Attacks.
Published: Oct 31, 2019
TJ Maher examines 10 reasons why his team uses the ThoughtWorks Gauge cross-platform test automation framework to set up acceptance tests at Threat Stack.
Published: Oct 17, 2019
F5’s Maggie Miller chats with an industry analyst on the trends driving optimism in the channel, how today’s buyers are different, and advice for F5 partners in this ever-changing market.
Published: Oct 3, 2019
F5 has a cloud-based solution available called the F5 DNS Load Balancer Cloud Service that leverages the AWS SaaS Enablement Framework and is now available in AWS Marketplace. While load balancing has traditionally been handled on-prem quite successfully, Roger Barlow outlines the many advantages of a SaaS-based approach.
Published: Oct 1, 2019
Peter Silva provides a quick introduction to NCSAM 2019, highlighting the theme of “Own IT. Secure IT. Protect IT.”, and also touching on resources F5 provides to help customers better secure applications.
Published: Sep 23, 2019
[Guest blog post] To promote app delivery automation, HashiCorp Terraform enables network operation teams to treat the F5 BIG-IP platform ‘as code,’ so the network infrastructure can be provisioned automatically when new services are deployed. Consul’s central service registry and service discovery capabilities track the real-time network location and health status of all backend services.
Published: Sep 20, 2019
Researchers from the University of Kansas and the Stevens Institute of Technology are focused on developing a new metrics framework for security operation centers (SOCs) that measures and validates SOC performance against enterprise network security. Peter Silva provides more detail on this project and its connection to F5.
Published: Sep 17, 2019
Through Unity+, F5 is collaborating with our partners to better meet their business needs and serve our mutual customers with flexible licensing models, greater deal registration differentiation and easy-to-consume sales and pre-sales technical learning paths.
Published: Sep 4, 2019
In this post, Tim Buntel explains how Threat Stack’s Application Security Monitoring satisfies the two distinct needs of PCI DSS Requirement 6.6: 1) Reviewing applications to proactively find vulnerabilities (and then make sure they get corrected), and 2) Detecting and blocking attacks in real time.
Published: Jul 18, 2019
Threat Stack’s Application Security Monitoring detects and blocks real-time attacks at runtime while also giving developers the context they need to build in security that can help prevent future attacks.
Published: Jul 16, 2019
Have you ever tried to drive somewhere as fast as you can, but you hit every red light along the way? Murphy’s Law, right? Well, the same thing can happen when you’re deploying your applications—either in your private data center or in a public cloud.
Published: Jul 9, 2019
Threat Stack’s Application Security Monitoring embeds security in development processes with no negative impact on agility or speed of application development and deployment.
Published: May 29, 2019
F5 SVP Calvin Rowland explains how F5 and Cisco are bringing ACI and BIG-IP closer together.
Published: May 21, 2019
Peter Silva summarizes a recent report on how organizations are moving quickly to adopt the new standard of Transport Layer Security (TLS) 1.3, while addressing both operational and security concerns as a result of the transition.
Published: May 15, 2019
Right now, DevOps is the topic for developers and network experts. The next step in understanding the state of the market was our recent webinar series, Why Application Modernization Matters to Digitalization, in collaboration with experts in this topic. What did they have to say?
Published: May 14, 2019
F5 SVP Calvin Rowland recaps last week’s Red Hat Summit in Boston, highlighting the continued partnership between the two companies that resulted in F5 being honored with a Partner Technology Innovation Award by Red Hat.
Published: May 7, 2019
Employees are often frustrated with corporate security policies and in general, most people’s primary jobs are not security related. F5 Security's Peter Silva discusses why it's important to devise security policies that work for, rather than against employees.
Published: Apr 9, 2019
In recent years, there’s been a volley of sorts about data replacing oil as the world’s most valuable resource. And, as you might imagine, there is far from uniform agreement on the topic.
Published: Mar 27, 2019
Venu Aravamudan, SVP & GM, F5 Cloud Services: F5 Cloud Services accelerate application delivery through a frictionless, intuitive multi-cloud platform. These SaaS solutions are optimized for cloud-native applications and microservices.
Published: Mar 25, 2019
SVP of Business Development Calvin Rowland shares his excitement around F5’s acquisition of NGINX and looks ahead at the promise of combining technology partner ecosystems with open source efforts to benefit customers and deliver end-to-end application services.
Published: Mar 18, 2019
Keiichiro Nozaki reflects on DevSecCon Singapore 2019 and the evolving roles of DevOps and Security teams, as well as the benefits of collaboration for both.
Published: Feb 8, 2019
When we received and started analyzing the results in The State of Application Services for 2019, we took a close look at some of the items on organizations’ agendas. It shows that while our part of the world has much in common with the rest of the planet, there are some important differences.
Published: Feb 6, 2019
SVP Calvin Rowland digs into a joint solution with Equinix that enables high-speed key retrieval, allowing BIG-IP to decrypt and orchestrate SSL traffic for any application regardless of its location—on-premises, private or public cloud—thereby drastically simplifying multi-cloud key management…and giving you one less thing to worry about.
Published: Feb 5, 2019
The Year of the Pig is upon us! Peter Silva offers his thoughts on the coming year and what it might represent for businesses, security, and the larger industry as 2019 unfolds.
Published: Jan 17, 2019
As a global solution architect at F5, I have the opportunity to look at a lot of access architectures and while many are aspiring, few have achieved their Zero Trust goals.
Published: Dec 18, 2018
Ankita Bhalla revisits the importance of understanding the industry’s use of third-party hardware, highlighting F5’s iHealth and new Remote Attestation for TPM Chain of Custody feature as examples of how F5 helps keep you and your applications protected.
Published: Dec 13, 2018
Keiichiro Nozaki, regional marketing architect/evangelist, recently attended the Gartner Symposium/ITxpo 2018 Asia Pacific on the Gold Coast, and asks the question: How many organizations are ready for digital transformation?
Published: Dec 12, 2018
This week sees the release of BIG-IQ 6.1, the latest evolution of F5’s management platform. Dan Schrader walks through the benefits of this new version, focusing on declarative technology for automating the delivery of network services, as well as updated security reporting and dashboards.
Published: Dec 12, 2018
It’s the time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Peter Silva collects his picks of notable prediction lists making the rounds as 2018 comes to a close, along with brief commentary on each.
Published: Dec 6, 2018
The stability and speed of today’s networks enable application services to act within a scalable system. Instead of a system deployed on a box, application delivery can embrace a modern, stack-based design. It can now be distributed to better take advantage of advances in technology and software, while continuing to benefit from expertise gained in previous years.
Published: Dec 5, 2018
2018 brought us larger breaches, bigger DDoS attacks, and intensifying challenges for organizations to face when defending their infrastructure from criminals. Applications were notably a primary target, and as 2019 rounds the corner, we need to be prepared for the continuous evolution of both cybercrime and security.
Published: Oct 8, 2018
Chief Architect Dave Schmitt and the Office of the CTO reflect on the importance of hardware security expertise in the context of the recent Bloomberg piece on Super Micro. The article also includes questions to ask your vendors to help make sure your systems are protected.
Published: Sep 25, 2018
While the adoption of cloud and containers have disrupted typical network architectures, applications remain tethered to the data for which they are the primary interface. CTO Ryan Kearny explains how a cause-and-effect relationship between apps and data is critical to the future of application delivery, particularly as we find ourselves on the verge of generating more data than we can move.
Published: Sep 17, 2018
Learn how to intercept and modify JavaScript on the fly using Chrome’s devtools protocol.
Published: Aug 30, 2018
During F5’s recent Agility conference in Boston, a group of industry participants from the global service provider community met to discuss and debate topics such as the role of emerging SDN infrastructures, automation, and security.
Published: Jul 25, 2018
A full-proxy for both SSL/TLS and HTTP, SSL Orchestrator can make intelligent decisions to steer inbound and outbound traffic to service chains within the security stack. No other solution can do that.
Published: Jul 25, 2018
What do terms like Identity Perimeter and Zero Trust actually mean for you? Graham Alderson takes a look in the context of F5's new Access Manager.
Published: Jul 9, 2018
F5 rounds out its appliance portfolio with improved price/performance, along with enhanced security and compliance features.
Published: Jul 9, 2018
Back in 2013, we were introduced to the concept of an immutable server. An immutable server is, as the term immutable suggests, static. Its configuration is fixed and cannot (or at least should not) be changed. If changes are required, a new...
Published: Mar 2, 2018
AWS has just announced enhanced F5 managed security capabilities on AWS WAF around Bot Protection, CVE Vulnerabilities, and Web Exploits.
Published: Feb 27, 2018
Changes to the EU’s roaming regulations and raised awareness of security risks are fueling dramatic increases in GPRS Tunneling Protocol (GTP) traffic.
Published: Jan 17, 2018
DX for BFSI industry Summary blog from Analyst Communication in APCJ theater by Kei.
Published: Dec 29, 2017
As December brings 2017 to a close, it also marks an opportunity to be retrospective and look back on the year that was. This past month, we’ve been highlighting some of our blog posts, security research, reports, F5 Labs threat intelligence, and...
Published: Dec 15, 2017
Peter Silva looks into the crystal balls of IT industry pundits and compiles a list of annual predictions for the coming year.
Published: Dec 6, 2017
The BIG-IP Virtual Edition showcased its ability to ensure performance, availability, and security for business-critical applications hosted within the AWS cloud.
Published: Nov 3, 2017
This year we hosted a series of Cloud focused events in the region and were fortunate to be able to connect with a number of customers. In this blog, I would like to summarize where those customers are, in terms of their Cloud shift, and wrap up...
Published: Sep 14, 2017
Along with their just-opened San Jose data center, Equinix leverages F5 BIG-IP for application services to support multi-cloud interconnection.
Published: Sep 13, 2017
content="The Ansible community requires everyone to be nice to each other, to be empathetic and to be kind. This is best evidenced by the Ansible Code of Conduct for events. One excerpt: “Ansible is dedicated to providing a harassment-free conference..."
Published: Sep 6, 2017
Over the past year, F5 and Ansible have been working hard to bring network automation solutions to our customers.
In successive releases, Ansible has introduced more and more network automation functionality, including persistent connections,...
Published: Aug 24, 2017
It’s no secret that security is the leading concern for the majority of public cloud users, but for some organizations and government agencies, it is even more paramount. For these groups, highly stringent regulatory and compliance requirements...
Published: Aug 8, 2017
F5's David Holmes looks back at the recently concluded DC25 and ponders future attendance.
Published: Aug 1, 2017
F5's principal threat research evangelist puts on his reporter hat to bring you some insights from one of the oldest hacker conferences there is.
Published: Jul 20, 2017
SVP Calvin Rowland breaks down what it means for organizations to deploy multi-cloud solutions, touching on DevOps topics as well.
Published: Jun 29, 2017
Nearly one in five of report respondents have security titles. F5's David Holmes takes a closer look at what's important to them.
Published: Jun 22, 2017
F5's Patricia Du discusses service provider topics, including how value-added services improve the customer experience by controlling traffic based on user profiles, network policies, and application characteristics.
Published: Apr 21, 2017
The main theme of this year’s Mobile World Congress (MWC) in Barcelona was the ongoing digital transformation toward a “connected society.” 5G will be instrumental in the adoption of Internet of Things (IoT) technologies such as smart...
Published: Apr 18, 2017
This week, F5 introduced the first and only turnkey solution package that includes advanced application and security services that are engineered, tested, and certified to run with the Red Hat OpenStack Platform.
Published: Mar 20, 2017
The changing of the software model from shrink-wrap to cloud brought security from an afterthought to the forefront. Here we dive into on three specific areas: confidentiality, integrity and availability.
Published: Mar 8, 2017
F5 Senior Vice President Lizzie Cohen-Laloum explores how achieving balanced executive dynamics and a broader range of strategic perspectives contribute to a robust chain of command.
Published: Feb 22, 2017
Operators are looking for an open, multi-vendor NFV platform to evolve and scale their networks to lower costs, reduce time to market, and improve operational efficiencies.
Published: Feb 16, 2017
As we all know, 4G and LTE are designed to improve capacity, user data-rates, spectrum usage, and latency. 5G represents more than just an evolution of mobile broadband.
Published: Feb 8, 2017
Imagine your best-case scenario: You’ve conducted security awareness training for your users and have educated them on all the threats that apply to them. You’ve cultivated a culture of security where everyone knows the tactics of phishers...
Published: Jan 20, 2017
The typical app loses more than three-quarters of its initial users within three days of downloading; in a month that figure climbs to 90 percent. Here are nine reasons why.
Published: Jan 20, 2017
Are you as good at presenting as you are at security? Here’s how to most effectively use the limited time you have with your board to explain the risk and the need, and what to do about both.
Published: Jan 4, 2017
With F5’s utility billing, customers can now implement an application delivery infrastructure with no upfront costs.
Published: Dec 16, 2016
The F5 Security Top 16 of 2016 | F5
2016 has been a year to remember when it comes to security (though perhaps also one that many would prefer to forget). Between data breaches, ransomware, hacktivism, zero day vulnerabilities, and DDoS attacks, no one’s information felt as safe as...
Published: Aug 23, 2016
We’re heading back to Las Vegas next week, this time for VMworld, Aug. 28–Sept. 1, at the Mandalay Bay Hotel and Convention Center. VMworld is a great opportunity to better realize the virtual possibilities of F5 and VMware, whether you’re attending the event or following along online.
Published: Aug 16, 2016
Tens of millions of people are out exploring the new world of Pokémon Go. It turns out that many of those users are not people at all, but automated agents, or bots. Game-playing bots are not a new phenomenon, but Pokémon Go offers some new use cases for bots.
Published: Aug 11, 2016
Service providers are experiencing tremendous growth in traffic. They feel pressure to scale their networks to meet demand while maintaining profitable business models. As the networks scale up and out, their operators face...
Published: Jul 6, 2016
With the proliferation of Internet access, and the explosion of online services over the past decade, more people were and continue to routinely share data loosely with more organisations. As apps and websites have mushroomed, control has...
Published: Jul 5, 2016
With fireworks in our rearview mirror, it’s time to turn our focus toward Las Vegas for Cisco Live, July 10-14, at the Mandalay Bay. Whether you’re going to the event or following online, here’s a snapshot of what to expect from F5 at...
Published: Jun 22, 2016
The developers of the Dridex malware display great proficiency in client and server paradigms as well as obfuscation. The following research outlines this skillset. It, along with Dridex authors’ commitment to the constant and frequent updates in the malware’s features, makes Dridex very agile and consequently hard to detect, decrypt, and analyze.
Published: May 16, 2016
Just how secure are your apps?
F5’s Anticipate 2016 event happening in Singapore on 18-19 May at St Regis Hotel will take a close look at this pertinent issue.
Security today is primarily centered on protecting the network...
Published: May 9, 2016
Australia is evolving a new way to leverage cloud, and New Zealand is evolving a new efficiency model for government security services. Both countries share one aspect with the rest of the world: challenges around encryption.
Published: May 1, 2016
Perspective from F5's David Holmes, who recently completed a security evangelism tour through Asia-Pacific North (APAC), including his thoughts on the challenges and opportunities in that part of the world.
Published: Apr 19, 2016
During the most recent Mobile World Congress in February 2016, there were a few primary themes that Mobile Network Operators (MNO) and leading-edge vendors (including F5) were discussing. These were the Internet of Things (IoT) and the...
Published: Feb 21, 2016
It’s that time of year again, time for the mobile industry to head to Barcelona to celebrate Mobile World Congress. It’s by far the largest mobile event in the world, and this year’s theme is ‘Mobile Is Everything.’ And for good reason: so much...
Published: Feb 14, 2016
If someone from the 19th century was teleported to witness a mathematics class in action in the year 2016, I would pay to see their astonished looks! From smart board interactions to children fiddling with iPads absorbing all the knowledge the...
Published: Dec 2, 2015
F5 Previews Pre-Configured Web Application Firewall Solution for Azure Security Center
Published: Nov 16, 2015
Applications sit at the heart of today’s world. They power businesses, serve customers and drive revenue. Emerging technologies open up fresh opportunities but they also bring about new challenges and a lot more complexity. A recent study by F5...
Published: Oct 21, 2015
Discussion of F5 application services available for use in Microsoft Azure.
Published: Jul 9, 2015
The theme at the recent LTE World Summit in Amsterdam was “Implementing Mobile Infrastructure for Next Generation Communication.” Conference topics focused on the massive growth of devices and skyrocketing data usage on LTE networks, as well as...
Published: Jun 11, 2015
Applications are fundamental to today’s economy. And applications are exploding in sheer numbers, types, and sizes – to meet a large variety of needs. Users of these applications are also increasingly location-independent and mobile, and they have...
Published: Jan 21, 2015
Today we introduce and explain an attack tool that is becoming more prevalent among our customers: the Account Checker.