What is Infrastructure as Code for NetOps?

As DevOps approaches creep over the wall into network operations, it drags with it new terminology. These colloquialisms can be confusing to NetOps who’ve not encountered them before, and can...

Read More >

F5 Announces New Application Services Offering for Multi-Cloud Environments

SEATTLE – F5 Networks (NASDAQ: FFIV) today introduced BIG-IP Cloud Edition, available May 31, enabling customers to quickly deploy critical application services for every app and any...

BIG-IP Cloud Edition: Per-app Security and Scale

There is a new network coming to a data center near you. And by ‘near you’ I mean within walking distance of your desk. Whether we like it or not, pressure from digital transformation continues to...

Stop DDoS Attacks Before They Deny Your Profitability

The recent State of the Internet/Security Report from Akamai shows that the number of Distributed Denial of Service (DDoS) attacks continues to increase—rising 14% over last year. This might not...

F5 Networks Announces Second Quarter Fiscal 2018 Results

SEATTLE – F5 Networks, Inc. (NASDAQ: FFIV) today announced revenue of $533.3 million for the second quarter of fiscal 2018, up 2.9% from $518.2 million in the second quarter of fiscal 2017....

Per-App Architectures Protect Apps at Home and in the Cloud

The data center is being driven to change by digital transformation, with cloud, containers, and catastrophic breaches prompting this evolution sooner rather than later.

Eight Reasons Why the Future of Scaling Containers is Service Mesh

Microservices are great for development velocity, but the complexity in these architectures lies in the service-to-service communication that microservices depend on. There are, right now, at...

Read More >

Workflows versus APIs

There's an API tax. It's the time and technical debt incurred by executing complex processes using individual API calls. And it grows as processes expand.

Read More >

The Three AWS Web Application Firewall Managed Rules You Need to Deploy Now

A mind-boggling number of applications reside in the cloud without any protection. No web app firewall. No identity or access control. Nothing. They’re just out there, open to attack. That’s a...

F5 Launches Advanced WAF For Multi-Cloud App Security

CANBERRA, AUSTRALIA – Coinciding with the ACSC conference this week, F5 Networks (NASDAQ: FFIV) is announcing its Advanced Web Application Firewall™ solution for comprehensive application...

Advanced threats require advanced solutions

Perspective from F5 SVP Ram Krishnan around digital transformation, and applications' role as both key business driver and high-value target.

WhiteHat & F5 link up for total web app security

Firms of all sizes rely on web applications for just about everything. Unfortunately, attackers know this too.

What Makes a WAF Advanced?

As the threat landscape evolves, so must our security controls and countermeasures. The most advanced perimeter threats for data loss or exfiltration occur at the application layer...

Business as Usual, Making the CISO Smile

As organizations transform the business with new applications and automation, it usually means exposing these business applications to the Internet and all the dangers that come with it.

Read More >

There is no such thing as a non-critical app when it comes to security

At Thermopylae, so the story goes, the Persians were able to defeat the Spartans by outflanking them thanks to a narrow goat path rather than the expected frontal assault.

Read More >

Why A Per-App Approach to Application Services Matters

I can’t read minds (my kids would disagree but that’s neither here nor there) but I can read the responses to our State of Application Delivery survey. And when I read them through the lens of...

Old Dog, New Targets: Switching to Windows to Mine Electroneum

Apache Struts 2 Jakarta Multipart Parser RCE crypto-mining campaign is now targeting Windows, not just Linux systems.

How Cloud and Containers are Driving Application Services to Disaggregate

Applications drive decisions on everything from location to the form-factor of delivery infrastructure, based on app needs and requirements.

Open Source Spotlight: New F5 modules in Ansible

New F5 modules have been added with more security profiles, licensing support, and monitoring. More information and community support for a variety of playbooks is available on DevCentral or Github.

Balancing Security and Performance with Web Application Firewalls

Using a WAF you can parse, pull apart, twist, and modify content however you want. But just because you can, doesn’t mean you should.

Twelve Tips to Help Employees Keep Devices Secure When Away from the Office

Laptops full of confidential data are still getting stolen, and public Wi-Fi hotspots are being booby-trapped. CISOs need to make users aware of the threat to prevent this from happening.

F5’s BIG-IP and IBM Cloud Private Integration

Microservice architectures are becoming the standard for cloud native workloads, but what about layer 4–7 services?

Production Pain Points and the Application Services that Relieve Them

Developers in a RisingStack survey cite performance, security, and deployment difficulties in production environments Not all security and performance is the result of ‘bad code’. Platforms and...

F5 Survey Reveals Digital Transformation Initiatives Driving Sudden Surge in Emerging Application Services for Government Organizations

State of Application Delivery report shows rise of multi-cloud architectures necessitating automation and application-centric security

I’ve Taken the Super-NetOps Course. Now How Do I Develop my Powers?

Robert Haynes walks you through suggested next steps once you've completed F5's initial Super-NetOps training.

The Hunt for IoT Exposes Targeting of Build Infrastructure

The Hunt for IoT by our own F5 Labs threat researchers continues. Its latest report exposes not only an active search for vulnerable IoT devices, but the targeting of build infrastructure.

The Hunt for IoT: The Growth and Evolution of Thingbots Ensures Chaos

IoT attacks show no signs of decreasing while infected IoT devices go un-remediated, and discovery of new thingbots is at a decade-long high.

Garbage In, Garbage Out: Don’t Automate Broken Processes

When I was a wee lass getting ready to deliver my company’s very first Internet-enabled application, I learned a valuable lesson. It wasn’t about technology. It wasn’t about the Internet. It was...

F5 Acquires Microsoft Gold Cloud Competency

Confidence in the public cloud is on the rise as the market and platforms mature, thanks in part to certification and competency validations from major providers.

Announcing F5 Managed Rulesets for AWS WAF

AWS has just announced enhanced F5 managed security capabilities on AWS WAF around Bot Protection, CVE Vulnerabilities, and Web Exploits.

The Importance of ADCs for IoT in Public Cloud Environments

With F5 BIG-IP virtual editions, IoT-focused organizations can seamlessly deploy in public or multi-cloud environments with maximum flexibility.

New F5 Private Cloud Solution Package for OpenStack

OpenStack supports an increasing number of mission-critical applications, but it can still be complex to set up. F5 makes it easier.

NetOps Needs to be Agile because the Cloud Can Change Overnight

NetOps needs to embrace DevOps methodologies and principles to restore the balance of stability and speed to support the growing number of applications deployed in the public cloud. There is a...

Three Signs of an App Attack Developers Should Know

Apps are under siege. Attacks occur with alarming frequency – every 39 seconds according to research conducted by the University of Maryland

Read More >

Application Services Update: Security, Speed, and Suspicious Visitors

It’s time again to dig into the application services organizations are actually using to make apps faster and safer. Of note is a rise in use of bot defense services and the slow but steady...

My New Car, the Rise of Multi-Access Edge Computing, and the BIG-IP i15000 Series

New network designs must better accommodate traffic to and from a massive number of smart devices. A 5G world is coming soon—F5 solutions can help as your 4G networks evolve.

Unlocking smart core network slicing for IoT and MVNOs

Network slicing is one of the most important 5G innovations available to mobile operators, allowing them to subdivide one physical network into multiple logical networks.

Conquering video: Overcoming the congestion conundrum

F5 technology offers a cost-effective solution to the challenge of video by improving the way Transmission Control Protocol (TCP) works on the mobile network.

Don’t take your eye off GTP en route to 5G

Changes to the EU’s roaming regulations and raised awareness of security risks are fueling dramatic increases in GPRS Tunneling Protocol (GTP) traffic.

State of Application Delivery 2018: Application Services are the Gateway to a Digital Future

The primary purpose for our State of Application Delivery research is to understand the current – and predict the future – state of application delivery around the world. That means a focus on...

Open Source Spotlight: F5 Enables A/B Testing and Blue/Green Deployments with Red Hat OpenShift

Today’s fast-paced, digitally-enabled data centers need to be able to direct traffic, not just distribute it. Red Hat OpenShift is in use by 21% of respondents according to the State of...

Read More >

F5 Solutions Accelerate Service Provider Transition to IoT, 5G, and NFV Technologies

BARCELONA – F5 announces a range of Internet of Things, 5G, and NFV solutions and capabilities ahead of next week's Mobile World Congress.

State of Application Delivery 2018: Security in the cloud, yes! Confidence, not so much.

Digital transformation is a forcing function, encouraging automation and orchestration across IT and driving organizations to the decision to deliver apps from the public cloud. In fact, digital...

NetOps Embrace of Automation will lead to need for NetOps Ops

Automation is the future. DevOps has long embraced the idea of automating everything in sight, but NetOps is quickly closing the gap between them using automation and orchestration extensively in...

Read More >

“Whether you’re in the #cloud (or many clouds) or staying home in the data center, a per-app architecture is a secu… https://t.co/XE6AOkhY7E
43 minutes ago

RT @F5Labs: [Blog] "How secure are your third-party web apps?" by @dunsany: https://t.co/pgaXLjcuGJ #AppSec #CISO https://t.co/G9LHDJzGdO
1 hour ago

ICYMI - Yesterday, we announced new application services offering - BIG-IP #Cloud Edition - for #multicloud environ… https://t.co/vBdvIVTn5v
2 hours ago

"How to gain visibility into a #multicloud environment": https://t.co/Js0t510jkL via @infoworld
4 hours ago

“Hello, cellular #IoT”: https://t.co/Fe9jYz57Xa via @NetworkWorld #5G
14 hours ago

RT @devcentral: In this #LightboardLesson, @jasonrahm covers the upcoming release of BIG-IP #Cloud Edition, a BIG-IQ and Per App V… https://t.co/krxGiZbI3J
17 hours ago

"BIG-IP #Cloud Edition: Per-app security and scale": https://t.co/ZAKv9LQFeH by @lmacvittie https://t.co/qN2K37iXVG
20 hours ago

[Press Release] F5 announces new application services offering for #multicloud environments:… https://t.co/4sfcu7Grtl
20 hours ago

[Press Release] F5 Networks announces Second Quarter Fiscal 2018 results: https://t.co/T2RRxJrVLy $FFIV
20 hours ago

Learn about the current state of cryptography and look towards the future in The 2017 #TLS Telemetry Report by… https://t.co/0eqXv6VwRd
23 hours ago

RT @WTCSeattle: "Be who you are. Don’t try to be somebody that you're not. It will never feel great." -Colleen Fukui-Sketchley of… https://t.co/FlpGnz2dVE
1 day ago

RT @F5Security: Join experts from @F5Networks & @awscloud for this morning's #AppSec webinar at 10 a.m. PT, registe… https://t.co/GTlpPxZbeg
1 day ago

"Getting in shape for summer with BIG-IP Per App Virtual Edition": https://t.co/DiJTm2EJM7 via @devcentral #BIGIP… https://t.co/GuJ8ZTK2dO
1 day ago

Join us this afternoon for F5 Networks' Quarter 2, FY2018 Financial Release and Earnings: https://t.co/CQQbDTDLRG $FFIV
1 day ago

“The #CIO as a boardroom influencer”: https://t.co/3cxuxiHel0 via @InformationAge #DX
1 day ago

“#AI: You can't test new ideas with old data”: https://t.co/AEG5yEU7cy via @InformationWeek
1 day ago

Proactive #bot defense and layer 7 behavioral DoS detection/defense are just a few highlights of the F5 Advanced… https://t.co/UhWqI5HGP0
1 day ago

RT @F5Security: “Stop #DDoS attacks before they deny your profitability” by @IoTNetSec: https://t.co/fyZJhkEBvI cc:… https://t.co/Swou8O0Hwc
1 day ago

#Security is still the most important application service according to our #SOAD18 respondents; get the 2018 State… https://t.co/upd1nNPXsQ
1 day ago