アーカイブ 記事を検索

OpenStack向けのF5プライベートクラウドソリューションパッケージ

by: Guido Vosmeer

今日の経済はソフトウェアで定義・制御されるようになっており、この中で企業は競合に打ち勝つため、より迅速に動くことが求められるようになっています。これは新しいアプリケーションを展開する場合でも同様です。高い競争力を獲得するには、スピードと俊敏性が欠かせません。IT部門はビジネスのこのような要求に応えるため、DevOpsに対して積極的に取り組む必要があります。そしてこの目的を達成する上で重要なツールとなるのが、プライベートクラウドです。多くの企業は独自のアーキテクチャに縛られることを望んでおら...

A10やCitrixを圧倒する、F5 BIG-IP iシリーズのSSLパフォーマンス

by: Guido Vosmeer

SSLの利用が爆発的に拡大し、第三者による解読が不可能な暗号アルゴリズムへのニーズが高まることで、PFS(Perfect Forward Secrecy:前方秘匿性)を実現できるECC(Elliptic Curve...

F5 BIG-IP iシリーズ vs. Citrix & A10、SSLパフォーマンス比較

by: Guido Vosmeer

F5が実施した実機テストによれば、新たにリリースされたF5 BIG-IP iシリーズは、比較対象となる他社デバイス(同価格帯の他社製品)に比べ、SSL ECC TPSが5倍高速であることがわかりました。

The Top 10, Top 10 Predictions for 2018

by: Peter Silva

Peter Silva looks into the crystal balls of IT industry pundits and compiles a list of annual predictions for the coming year.

Another Year of re:Invent, Another Year of Advances for F5 on AWS

by: Chad Whalen

F5's Chad Whalen reflects on the significant advancements F5 has made with AWS following an amazing week at AWS re:Invent.

Security Rule One: You’re probably violating it right now

by: Lori MacVittie

By now you’ve heard Security Rule Zero enough to know it by heart. You do know it by heart, right? Just in case, let me refresh your memory: THOU SHALT NOT TRUST USER INPUT. EVER. Excellent. Now that we’ve got that fundamental rule established...

Security Rule Zero: A Warning about X-Forwarded-For

by: Lori MacVittie

Proxies operate on the premise that they exist to forward requests from one system to another. They generally add some value like load balancing (scale), data leak prevention (security), or compression (performance).

F5 Achieves AWS Networking Competency

by: David Helfer

The BIG-IP Virtual Edition showcased its ability to ensure performance, availability, and security for business-critical applications hosted within the AWS cloud.

HTTP Rising: Telemetry, Tracking, and Terror in Container Environs

by: Lori MacVittie

HTTP is ubiquitous. If a device has networking capabilities, it probably speaks HTTP as fluently as you speak your native language.

Cloud Can’t Protect You Against Yourself

by: Lori MacVittie

Cloud security. The term itself is actually meaningless without qualification. Do you mean the security of the underlying infrastructure that makes up “cloud”? Or perhaps of command and control APIs that let you provision and manage compute,...

Managing Digital Certs: Making the Essential Less Annoying

by: Dan Schrader

F5's Dan Schrader highlights how BIG-IQ makes SSL certificate management (and your life) a bit easier.

Open Source Spotlight: F5 Infrastructure as Code and Multi-Cloud Manageability

by: Lori MacVittie

You might have noted that a significant drum beat under the multi-cloud mantra is manageability. That’s because the task of scaling, securing, and delivering apps to users requires a certain set of services – load balancers, compute, storage, app...

The Risks of Running HTTP are Increasing but Manageable

by: Lori MacVittie

Whether we like it or not, HTTP is the de facto application transport protocol of the modern age. We use it everywhere. It’s as ubiquitous as IP and TCP, and serves much the same purpose. Its only goal is to transport the digital gold of today’s...

Combat Commodified Attacks with Managed Security Services

by: Lee Slaughter

Anyone with access to a computer can point a DDoS-for-hire push button tool anywhere they want for just a few bucks. The sophistication is low and the accessibility is high, meaning the frequency of these attacks is primed to increase.

Why CVEs Should Be Given Priority One for Resolution

by: Lori MacVittie

When considering vulnerabilities, remember application security is a stack. You may have heard me say this before, but sometimes we need a reminder that modern applications are never deployed alone.