アーカイブ 記事を検索

OpenStack向けのF5プライベートクラウドソリューションパッケージ

by: Guido Vosmeer

今日の経済はソフトウェアで定義・制御されるようになっており、この中で企業は競合に打ち勝つため、より迅速に動くことが求められるようになっています。これは新しいアプリケーションを展開する場合でも同様です。高い競争力を獲得するには、スピードと俊敏性が欠かせません。IT部門はビジネスのこのような要求に応えるため、DevOpsに対して積極的に取り組む必要があります。そしてこの目的を達成する上で重要なツールとなるのが、プライベートクラウドです。多くの企業は独自のアーキテクチャに縛られることを望んでおら...

A10やCitrixを圧倒する、F5 BIG-IP iシリーズのSSLパフォーマンス

by: Guido Vosmeer

SSLの利用が爆発的に拡大し、第三者による解読が不可能な暗号アルゴリズムへのニーズが高まることで、PFS(Perfect Forward Secrecy:前方秘匿性)を実現できるECC(Elliptic Curve...

F5 BIG-IP iシリーズ vs. Citrix & A10、SSLパフォーマンス比較

by: Guido Vosmeer

F5が実施した実機テストによれば、新たにリリースされたF5 BIG-IP iシリーズは、比較対象となる他社デバイス(同価格帯の他社製品)に比べ、SSL ECC TPSが5倍高速であることがわかりました。

Programmable Proxies are the Duct Tape of the Internet

by: Lori MacVittie

Programmable proxies protect ports from predators – like those targeting SMB today.   When the Internet was in its infancy, my oldest three children were teenagers. Even then – with a far smaller Internet - unfettered access was not...

Was DC25 My Last DEF CON?

by: David Holmes

F5's David Holmes looks back at the recently concluded DC25 and ponders future attendance.

Cloud Needs Operational Gates–Especially for Security

by: Lori MacVittie

In January of 2017, the very popular MongoDB suffered what seems to be becoming a fairly predictable tactic for attackers: taking data hostage. Subsequent investigation noted that for the most part, attackers had exploited … nothing.

Realizing FIPS Validation in Virtualized, SDN, and Cloud Data Centers

by: Henry Tam

Securing your data and infrastructure while transitioning to cloud (and software-defined everything) is complicated, but throw in tighter, stricter regulatory compliance and then you really have complexity and risk.

Black Hat at 20 – A Quick Recap

by: David Holmes

F5's principal threat research evangelist puts on his reporter hat to bring you some insights from one of the oldest hacker conferences there is.

Container Danger in the Cloud

by: Lori MacVittie

The slow but steady migration to cloud-based environments has had an impact on many aspects of IT. One we rarely make mention of is administration. But we should.

Is 2017 Half Empty or Half Full?

by: Peter Silva

F5 DevCentral's Pete Silva takes a look at tech trends thus far in 2017, with ransomeware (still) top-of-mind.

Rethink Your Access Strategy, Think BeyondCorp

by: Lee Slaughter

F5's Lee Slaughter offers his take on the 'zero trust' model, along with solutions from F5 and Google.

Stop the IoT attack that comes before THE ATTACK

by: Lori MacVittie

Generally speaking, the use of the term “attack” has come to mean an attempt to deny service to an organization. That’s likely because the frequency and volume of DDoS attacks have had serious consequences for high-profile organizations. The...

Top Security Findings in the F5 State of Application Delivery Report

by: David Holmes

Nearly one in five of report respondents have security titles. F5's David Holmes takes a closer look at what's important to them.

Three Things App Security is Not

by: Lori MacVittie

App security is a lot of things, but sometimes we need to stop and consider what it isn’t, particularly as the volume and frequency of applications developed and deployed to meet the insatiable demand continues to rise. 1. Not a high priority A...