アーカイブ 記事を検索

How IoT can compromise network integrity

by: Bernd Kunze

The IoT (Internet of Things) is shaking up the networking space and paving the way for machine-to-machine (M2M) communication and automated processes.

Per-App Architectures Protect Apps at Home and in the Cloud

by: Lori MacVittie

The data center is being driven to change by digital transformation, with cloud, containers, and catastrophic breaches prompting this evolution sooner rather than later.

Don’t take your eye off GTP en route to 5G

by: Peter Nas

Changes to the EU’s roaming regulations and raised awareness of security risks are fueling dramatic increases in GPRS Tunneling Protocol (GTP) traffic.

Unlocking smart core network slicing for IoT and MVNOs

by: Bart Salaets

Network slicing is one of the most important 5G innovations available to mobile operators, allowing them to subdivide one physical network into multiple logical networks.

Conquering video: Overcoming the congestion conundrum

by: Raffaele D'Albenzio

F5 technology offers a cost-effective solution to the challenge of video by improving the way Transmission Control Protocol (TCP) works on the mobile network.

State of Application Delivery 2018: Application Services are the Gateway to a Digital Future

by: Lori MacVittie

The primary purpose for our State of Application Delivery research is to understand the current – and predict the future – state of application delivery around the world. That means a focus on application services. These are the broad set...

The State of Application Delivery 2018: Digital Transformation Driving Automation and Multi-Cloud Despite Security Concerns

by: Lori MacVittie

Discover the key findings of F5's fourth annual State of Application Delivery report.

Welcome to 2018: Apps Under Siege

by: Lori MacVittie

Apps are the strategy upon which business has staked its digital survival, and F5 Labs research shows they will remain under siege in 2018. This year, let’s resolve to be vigilant in their protection, no matter whether they lie over hill in the...

Security Rule One: You’re probably violating it right now

by: Lori MacVittie

By now you’ve heard Security Rule Zero enough to know it by heart. You do know it by heart, right? Just in case, let me refresh your memory: THOU SHALT NOT TRUST USER INPUT. EVER. Excellent. Now that we’ve got that fundamental rule established...

Security Rule Zero: A Warning about X-Forwarded-For

by: Lori MacVittie

Proxies operate on the premise that they exist to forward requests from one system to another. They generally add some value like load balancing (scale), data leak prevention (security), or compression (performance).

Container Danger in the Cloud

by: Lori MacVittie

The slow but steady migration to cloud-based environments has had an impact on many aspects of IT. One we rarely make mention of is administration. But we should.

Rethink Your Access Strategy, Think BeyondCorp

by: Lee Slaughter

F5's Lee Slaughter offers his take on the 'zero trust' model, along with solutions from F5 and Google.

Possession and Identity in the Internet of Things

by: Lori MacVittie

Long-time tech watchers have seen the gradual move of computing devices from no-user to multi-user to single-user models.

The Gateways to Innovation are in the Network

by: Lori MacVittie

Throughout history, certain places have been anointed with the term “gateway to the _____.” These locations are famous for being strategically important for the defense of a kingdom or as a pathway to new opportunities.

Hello IoT, Goodbye Security Innocence

by: Bernd Kunze

2016 showed us that the Internet of Things (IoT) is a game-changer when it comes to service provider networks.