As DevOps approaches creep over the wall into network operations, it drags with it new terminology. These colloquialisms can be confusing to NetOps who’ve not encountered them before, and can...
SEATTLE – F5 Networks (NASDAQ: FFIV) today introduced BIG-IP Cloud Edition, available May 31, enabling customers to quickly deploy critical application services for every app and any...
There is a new network coming to a data center near you. And by ‘near you’ I mean within walking distance of your desk. Whether we like it or not, pressure from digital transformation continues to...
The recent State of the Internet/Security Report from Akamai shows that the number of Distributed Denial of Service (DDoS) attacks continues to increase—rising 14% over last year. This might not...
SEATTLE – F5 Networks, Inc. (NASDAQ: FFIV) today announced revenue of $533.3 million for the second quarter of fiscal 2018, up 2.9% from $518.2 million in the second quarter of fiscal 2017....
The data center is being driven to change by digital transformation, with cloud, containers, and catastrophic breaches prompting this evolution sooner rather than later.
Microservices are great for development velocity, but the complexity in these architectures lies in the service-to-service communication that microservices depend on. There are, right now, at...
There's an API tax. It's the time and technical debt incurred by executing complex processes using individual API calls. And it grows as processes expand.
A mind-boggling number of applications reside in the cloud without any protection. No web app firewall. No identity or access control. Nothing. They’re just out there, open to attack. That’s a...
CANBERRA, AUSTRALIA – Coinciding with the ACSC conference this week, F5 Networks (NASDAQ: FFIV) is announcing its Advanced Web Application Firewall™ solution for comprehensive application...
Perspective from F5 SVP Ram Krishnan around digital transformation, and applications' role as both key business driver and high-value target.
Firms of all sizes rely on web applications for just about everything. Unfortunately, attackers know this too.
As the threat landscape evolves, so must our security controls and countermeasures. The most advanced perimeter threats for data loss or exfiltration occur at the application layer...
As organizations transform the business with new applications and automation, it usually means exposing these business applications to the Internet and all the dangers that come with it.
At Thermopylae, so the story goes, the Persians were able to defeat the Spartans by outflanking them thanks to a narrow goat path rather than the expected frontal assault.
I can’t read minds (my kids would disagree but that’s neither here nor there) but I can read the responses to our State of Application Delivery survey. And when I read them through the lens of...
Apache Struts 2 Jakarta Multipart Parser RCE crypto-mining campaign is now targeting Windows, not just Linux systems.
Applications drive decisions on everything from location to the form-factor of delivery infrastructure, based on app needs and requirements.
New F5 modules have been added with more security profiles, licensing support, and monitoring. More information and community support for a variety of playbooks is available on DevCentral or Github.
Using a WAF you can parse, pull apart, twist, and modify content however you want. But just because you can, doesn’t mean you should.
Laptops full of confidential data are still getting stolen, and public Wi-Fi hotspots are being booby-trapped. CISOs need to make users aware of the threat to prevent this from happening.
Microservice architectures are becoming the standard for cloud native workloads, but what about layer 4–7 services?
Developers in a RisingStack survey cite performance, security, and deployment difficulties in production environments Not all security and performance is the result of ‘bad code’. Platforms and...
State of Application Delivery report shows rise of multi-cloud architectures necessitating automation and application-centric security
Robert Haynes walks you through suggested next steps once you've completed F5's initial Super-NetOps training.
The Hunt for IoT by our own F5 Labs threat researchers continues. Its latest report exposes not only an active search for vulnerable IoT devices, but the targeting of build infrastructure.
IoT attacks show no signs of decreasing while infected IoT devices go un-remediated, and discovery of new thingbots is at a decade-long high.
When I was a wee lass getting ready to deliver my company’s very first Internet-enabled application, I learned a valuable lesson. It wasn’t about technology. It wasn’t about the Internet. It was...
Confidence in the public cloud is on the rise as the market and platforms mature, thanks in part to certification and competency validations from major providers.
AWS has just announced enhanced F5 managed security capabilities on AWS WAF around Bot Protection, CVE Vulnerabilities, and Web Exploits.
With F5 BIG-IP virtual editions, IoT-focused organizations can seamlessly deploy in public or multi-cloud environments with maximum flexibility.
OpenStack supports an increasing number of mission-critical applications, but it can still be complex to set up. F5 makes it easier.
NetOps needs to embrace DevOps methodologies and principles to restore the balance of stability and speed to support the growing number of applications deployed in the public cloud. There is a...
Apps are under siege. Attacks occur with alarming frequency – every 39 seconds according to research conducted by the University of Maryland
It’s time again to dig into the application services organizations are actually using to make apps faster and safer. Of note is a rise in use of bot defense services and the slow but steady...
New network designs must better accommodate traffic to and from a massive number of smart devices. A 5G world is coming soon—F5 solutions can help as your 4G networks evolve.
Network slicing is one of the most important 5G innovations available to mobile operators, allowing them to subdivide one physical network into multiple logical networks.
F5 technology offers a cost-effective solution to the challenge of video by improving the way Transmission Control Protocol (TCP) works on the mobile network.
Changes to the EU’s roaming regulations and raised awareness of security risks are fueling dramatic increases in GPRS Tunneling Protocol (GTP) traffic.
The primary purpose for our State of Application Delivery research is to understand the current – and predict the future – state of application delivery around the world. That means a focus on...
Today’s fast-paced, digitally-enabled data centers need to be able to direct traffic, not just distribute it. Red Hat OpenShift is in use by 21% of respondents according to the State of...
BARCELONA – F5 announces a range of Internet of Things, 5G, and NFV solutions and capabilities ahead of next week's Mobile World Congress.
Digital transformation is a forcing function, encouraging automation and orchestration across IT and driving organizations to the decision to deliver apps from the public cloud. In fact, digital...
Automation is the future. DevOps has long embraced the idea of automating everything in sight, but NetOps is quickly closing the gap between them using automation and orchestration extensively in...
“Whether you’re in the #cloud (or many clouds) or staying home in the data center, a per-app architecture is a secu… https://t.co/XE6AOkhY7E
43 minutes ago
RT @F5Labs: [Blog] "How secure are your third-party web apps?" by @dunsany: https://t.co/pgaXLjcuGJ #AppSec #CISO https://t.co/G9LHDJzGdO
1 hour ago
ICYMI - Yesterday, we announced new application services offering - BIG-IP #Cloud Edition - for #multicloud environ… https://t.co/vBdvIVTn5v
2 hours ago
"How to gain visibility into a #multicloud environment": https://t.co/Js0t510jkL via @infoworld
4 hours ago
“Hello, cellular #IoT”: https://t.co/Fe9jYz57Xa via @NetworkWorld #5G
14 hours ago
RT @devcentral: In this #LightboardLesson, @jasonrahm covers the upcoming release of BIG-IP #Cloud Edition, a BIG-IQ and Per App V… https://t.co/krxGiZbI3J
17 hours ago
"BIG-IP #Cloud Edition: Per-app security and scale": https://t.co/ZAKv9LQFeH by @lmacvittie https://t.co/qN2K37iXVG
20 hours ago
[Press Release] F5 announces new application services offering for #multicloud environments:… https://t.co/4sfcu7Grtl
20 hours ago
[Press Release] F5 Networks announces Second Quarter Fiscal 2018 results: https://t.co/T2RRxJrVLy $FFIV
20 hours ago
Learn about the current state of cryptography and look towards the future in The 2017 #TLS Telemetry Report by… https://t.co/0eqXv6VwRd
23 hours ago
RT @WTCSeattle: "Be who you are. Don’t try to be somebody that you're not. It will never feel great." -Colleen Fukui-Sketchley of… https://t.co/FlpGnz2dVE
1 day ago
RT @F5Security: Join experts from @F5Networks & @awscloud for this morning's #AppSec webinar at 10 a.m. PT, registe… https://t.co/GTlpPxZbeg
1 day ago
"Getting in shape for summer with BIG-IP Per App Virtual Edition": https://t.co/DiJTm2EJM7 via @devcentral #BIGIP… https://t.co/GuJ8ZTK2dO
1 day ago
Join us this afternoon for F5 Networks' Quarter 2, FY2018 Financial Release and Earnings: https://t.co/CQQbDTDLRG $FFIV
1 day ago
“The #CIO as a boardroom influencer”: https://t.co/3cxuxiHel0 via @InformationAge #DX
1 day ago
“#AI: You can't test new ideas with old data”: https://t.co/AEG5yEU7cy via @InformationWeek
1 day ago
Proactive #bot defense and layer 7 behavioral DoS detection/defense are just a few highlights of the F5 Advanced… https://t.co/UhWqI5HGP0
1 day ago
RT @F5Security: “Stop #DDoS attacks before they deny your profitability” by @IoTNetSec: https://t.co/fyZJhkEBvI cc:… https://t.co/Swou8O0Hwc
1 day ago
#Security is still the most important application service according to our #SOAD18 respondents; get the 2018 State… https://t.co/upd1nNPXsQ
1 day ago
Back to the Newsroom Home Page