アーカイブ 記事を検索

OpenStack向けのF5プライベートクラウドソリューションパッケージ

by: Guido Vosmeer

今日の経済はソフトウェアで定義・制御されるようになっており、この中で企業は競合に打ち勝つため、より迅速に動くことが求められるようになっています。これは新しいアプリケーションを展開する場合でも同様です。高い競争力を獲得するには、スピードと俊敏性が欠かせません。IT部門はビジネスのこのような要求に応えるため、DevOpsに対して積極的に取り組む必要があります。そしてこの目的を達成する上で重要なツールとなるのが、プライベートクラウドです。多くの企業は独自のアーキテクチャに縛られることを望んでおら...

A10やCitrixを圧倒する、F5 BIG-IP iシリーズのSSLパフォーマンス

by: Guido Vosmeer

SSLの利用が爆発的に拡大し、第三者による解読が不可能な暗号アルゴリズムへのニーズが高まることで、PFS(Perfect Forward Secrecy:前方秘匿性)を実現できるECC(Elliptic Curve...

F5 BIG-IP iシリーズ vs. Citrix & A10、SSLパフォーマンス比較

by: Guido Vosmeer

F5が実施した実機テストによれば、新たにリリースされたF5 BIG-IP iシリーズは、比較対象となる他社デバイス(同価格帯の他社製品)に比べ、SSL ECC TPSが5倍高速であることがわかりました。

How F5’s WAF Earned its AWS Security Competency

by: Tom Atkins

F5's Tom Atkins takes a closer look at the company's recently achieved AWS milestone, supporting those aiming to mitigate attacks on applications deployed in the public cloud.

Dear NetOps: Security Rule Zero Applies to You, Too

by: Lori MacVittie

Okay, NetOps. As you’re getting all automated up and scripting your hearts out, it’s time for a gentle reminder about security. I’m not talking about firewalls and WAF or other security services you may be responsible for.

Taking Customers to AWS, Through Our Channel

by: David Helfer

SVP of Worldwide Channels David Helfer highlights F5's selection for the AWS Channel Opportunity Registration Program and just-achieved AWS Security Competency.

Example-driven Insecurity Illustrates Need for WAF

by: Lori MacVittie

Learning online is big. Especially for those who self-identify as a developer. If you take a peek at Stack Overflow’s annual developer survey...

Making Multi-Cloud Manageable: F5 Application Connector Now Available for Microsoft Azure

by: Lori MacVittie

When using multiple public clouds to host applications, you’ve still got to manage those apps and connect them to a secure inbound path.

Bots are the Bane of Turing Security Test

by: Lori MacVittie

Bots are cool. Bots are scary. Bots are the future. Bots are getting smarter every day. Depending on what kind of bot we’re talking about, we’re either frustrated or fascinated by them.

Ceding Control of IoT for the Sake of Security

by: Lori MacVittie

We are, I think it’s safe to say, universally delighted by technology. The mundane is transformed into the magical by the mere introduction of technology. The novelty wears off after a time, of course, but by then there’s some other task that has...

Vulnerable Stuff Running in Containers Still Vulnerable Stuff

by: Lori MacVittie

It has been said – and not just by me – that encrypted malicious code is still malicious code. The encryption does nothing to change that...

Hoisted by Our Own Petards: Big Dirty Data

by: Lori MacVittie

Big data. Petabytes generated on an hourly basis for millions of sensors and monitors embedded in things across the business value chain. From manufacturing to delivery, from POS to consumers, data is being generated in unprecedented amounts. ...

Programmable Proxies are the Duct Tape of the Internet

by: Lori MacVittie

Programmable proxies protect ports from predators – like those targeting SMB today.   When the Internet was in its infancy, my oldest three children were teenagers. Even then – with a far smaller Internet - unfettered access was not...

Was DC25 My Last DEF CON?

by: David Holmes

F5's David Holmes looks back at the recently concluded DC25 and ponders future attendance.

Cloud Needs Operational Gates–Especially for Security

by: Lori MacVittie

In January of 2017, the very popular MongoDB suffered what seems to be becoming a fairly predictable tactic for attackers: taking data hostage. Subsequent investigation noted that for the most part, attackers had exploited … nothing.