F5 is leading the way in solving important challenges—from specific technical scenarios to evolving industry trends. White papers give you real-world context for the role F5 technologies can play in meeting these challenges and using emerging trends to your full advantage.


Six Common Challenges of Cloud Implementations | Overview

Wireless security in LTE networks | Senza Fili Consulting white paper | Overview

LTE-Network Monetization: Combining the Data Plane, Signaling and User Data | Informa white paper | Overview

ROI of Application Delivery Controllers in Traditional & Virtualized Environments | Overview


Filter by:

Migrating Tier 1 Application Workloads to AWS with F5Migrating Tier 1 Application Workloads to AWS with F5 | F5 White Paper | Overview

Enterprises deploying applications on AWS may have concerns about performance and security. The F5 BIG-IP platform alleviates these with high availability, performance, and security.

Extending SDN Architectures with F5’s L4–7 Application and Gateway Services | Overview

Software-defined networking is a method of systematically designing networks from the ground up based on the key concept of centralized control over forwarding elements. F5’s L4–7 application and gateway services help organizations deliver applications using SDN architectures that are both directly programmable and that can be programmatically configured with open APIs.

The Shortfall of Network Load Balancing | Overview

Applications running across networks encounter a range of performance, security, and availability challenges. Struggling to adapt and faced with requirements for application delivery that have evolved beyond the capabilities of traditional network load balancers, organizations must migrate to a more advanced application delivery architecture.

Simplifying Security for Mobile Networks | Overview

Communications service providers face an array of complex challenges, from network growth and increasing security threats to technology transitions. The F5 S/Gi firewall solution delivers a comprehensive solution, ensuring security and high availability, providing insight for new services and revenues, and positioning CSPs for more growth in the future.

Vulnerability Assessment with Application Security | Overview

Targeted attacks are growing and companies are scrambling to protect critical web applications. Both a vulnerability scanner and a web application firewall are required to properly secure web applications—and F5 BIG-IP Application Security Manager (ASM) offers both on a single platform.

The Programmable Network | Overview

Emerging software-defined data center solutions focus on the need for programmability in the network to reduce costs and realize the benefits of automation. Whether the goal is cloud computing or an SDN, F5 BIG-IP products provide that programmability to ensure a successful implementation.

Virtual Clustered Multiprocessing (vCMP) | Overview

Clustered Multiprocessing (CMP) technology introduced by F5 in 2008 enabled organizations to consolidate physical, purpose-built resources into a single virtual entity that provides near 1:1 scaling of performance by simply adding or upgrading resource blades. Virtual Clustered Multiprocessing (vCMP), the industry’s first purpose-built hypervisor, completes this functionality by allowing administrators to completely segment those resources into independent, virtual ADCs.

VXLAN and the BIG-IP Platform | Overview

BYOD, cloud computing, big data, and converged communications are forcing networks beyond the ability to scale and manage efficiently. VXLAN, a result of SDN and network virtualization efforts, strives to shift the burden from operations to technology. F5 BIG-IP platform support for VXLAN enables seamless transitions from traditional to virtual network architectures.

ScaleN: Elastic Infrastructure | Overview

Emerging data center models are based on flexibility and non-disruptive, on-demand scalability. Infrastructure must not only support these capabilities, but be able itself to provide these same benefits and capabilities. F5 ScaleN is a breakthrough in high availability and scalability, offering the robust capabilities required to enable multi-tenant solutions, elastic applications, and infrastructure for any environment.

Understanding Advanced Data Compression | Overview

Nearly all WAN optimization appliances store and use previously transferred network data to achieve high compression ratios, while leveraging advanced compression routines to improve application performance. How they achieve these gains, and the limitations of certain routines, vary widely and can significantly affect the improvements and benefits associated with WAN application delivery services.

F5 BIG‑IP Application Acceleration Manager in Data Replication Environments | Overview

Using F5 BIG-IP Application Acceleration Manager, enterprises can increase efficiency, decrease backup windows, offload encryption, and improve wide area network throughput to distributed data centers.

Enabling Policy in the New Mobile Architecture | Overview

Communications service providers are challenged to build larger and faster data networks to support customer needs while seeking new and innovative ways to manage and monetize those networks. F5 BIG-IP Policy Enforcement Manager allows service providers to apply dynamic policies and enable services based on subscriber and application context.

Symmetric Optimization in the Cloud with BIG-IP AAM VE | Overview

As applications and storage move out to the cloud, performance of the corporate communications link between the data center and the cloud will become more important. Optimizing transfers to the cloud with symmetric WAN optimization technology improves WAN communications performance and contains costly bandwidth upgrades.

Building a CDN with F5 | Overview

Content delivery networks are useful services for transferring data over long distances, delivering an optimized user experience, and securing data in an otherwise public environment. However, concerns about cost and control of critical data drive many organizations to seek an alternative delivery mechanism, one that can be achieved with F5 products. The F5® BIG-IP® platform can deliver an internal CDN managed by the IT department with no monthly fees and with bandwidth limited only by connection, not cost per megabyte.

Automating F5 Application Services for VMware with F5 BIG-IQ Cloud | Overview

Virtual machine and application provisioning are now being automated while network service provisioning is not, thus causing delays. Integration between the F5 intelligent services platform and VMware addresses this gap to allow policy-based, self-service provisioning of application networking

The Dynamic DNS Infrastructure | Overview

Between the proliferation of mobile devices and the ever-increasing amount of content on the web, DNS usage has seen a huge increase in recent years. Meanwhile, DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. For organizations confronting these growth and security challenges, F5’s new full-proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing.

Replacing Abstract Zones with Real Application Security Policy | Overview

Abstract zones have evolved as a way to reduce the difficulty of managing a complex and expanding set of firewall rules. Yet zones do not prevent the accretion of orphaned firewall rules; they merely mask it and the problems it can cause. Application-centric firewall policy management is a new approach to managing firewall policy that is gaining traction in the IT community because it offers better performance, manageability, and visibility.

Post-TMG: Securely Delivering Microsoft Applications | Overview

Microsoft Forefront Threat Management Gateway customers need an alternative to secure their Internet-facing Microsoft applications. F5 BIG-IP Application Delivery Controllers provide the advanced features necessary to fill the gap.

Building an Enterprise Cloud with F5 and IBM | Overview

Building a dynamic, agile enterprise cloud can be a daunting task. F5 and IBM have created a reference architecture that will accelerate the design and deployment phases and help ensure a successful enterprise cloud architecture.

Mitigating DDoS Attacks with F5 Technology | Overview

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. Taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.

Solving Substantiation with SAML | Overview

Organizations are deploying distributed, hybrid architectures that can span multiple security domains. At any moment, a user could be accessing the corporate data center, the organization's cloud infrastructure, or even a third party, SaaS web application. Security Assertion Markup Language (SAML) can provide the identity information necessary to implement an enterprise-wide SSO solution.

The Application Delivery Firewall Paradigm | Overview

The increasing sophistication, frequency, and diversity of today’s network attacks are overwhelming conventional stateful security devices at the edge of the data center. A new data center architecture based on the security services of the F5 application delivery firewall solution effectively combats modern attacks while providing significant CapEx savings.

Load Balancing 101: Nuts and Bolts | Overview

Load balancing technology is the basis on which today’s Application Delivery Controllers operate. But the pervasiveness of load balancing technology does not mean it is universally understood, nor is it typically considered from anything other than a basic, network-centric viewpoint. To maximize its benefits, organizations should understand both the basics and nuances of load balancing.

Load Balancing 101: The Evolution to Application Delivery Controllers | Overview

As load balancers continue evolving into today’s Application Delivery Controllers (ADCs), it’s easy to forget the basic problem for which load balancers were originally created— producing highly available, scalable, and predictable application services. ADCs’ intelligent application routing, virtualized application services, and shared infrastructure deployments can obscure these original goals—but it’s still critical to understand the fundamental role load balancing plays in ADCs.

Five Ways F5 Improves XenApp or XenDesktop Implementations | Overview

VDI is an integral component of strategies involving multiple data centers, including mobile and branch office data centers, and demand for VDI solutions is growing. Performance, security, and reliability are paramount to successfully delivering VDI over a variety of networks to myriad device types. F5 products can significantly enhance the delivery and reliability of Citrix VDI solutions.

Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform | Overview

This document provides guidance for utilizing BIG-IP Access Policy Manager (APM) and BIG-IP Application Security Manager (ASM) to significantly enhance Exchange 2010 mobile device security.

Geolocation and Application Delivery | Overview

The data from geolocation providers offers highly valuable data to a variety of stakeholders and is no longer just for advertising.

Cloud Balancing: The Evolution of Global Server Load Balancing | Overview

Cloud balancing evolves global server load balancing from traditional routing options based on static data to context-aware distribution across cloud-based services, both internal and external. In so doing, automation reduces errors and IT labor hours while speeding the resource response to changing environmental conditions.

Optimizing Diameter Signaling Networks | Heavy Reading white paper | Overview

This white paper examines the challenges and assesses the architectural alternatives for deploying next-generation, Diameter-based signaling.

F5 and Infoblox DNS Integrated Architecture: Offering a Complete, Scalable, Secure DNS Solution | Overview

As leaders in the application delivery market and DNS, DHCP, and IP Address Management (DDI) market respectively, F5 and Infoblox have teamed up to provide customers with a complete DNS solution. This solution provides superior DNS management capabilities, flexible and intelligent global server load balancing, high-performance, scalable DNS, and complete DNSSEC signing for all zones.

Managing the Migration to IPv6 Throughout the Service Provider Network | Overview

While service providers worldwide are beginning to acknowledge that they need to adopt IPv6, most are still struggling to define a workable strategy around it. F5 solutions provide the flexibility service providers need to devise gradual transition plans, maintain control over the IP network, support their customers, and minimize service disruption and downtime.

F5 and Windows Server 2012 DirectAccess/Remote Access Services | Overview

The F5 BIG-IP platform provides high availability, performance, and scalability when used to deliver traffic management and load balancing for the Microsoft Windows Server 2012 Remote Access Solutions: DirectAccess and Remote Access Services.

Designing F5 Application Delivery to Maximize Business Value | Overview

Applications and users drive business, and application delivery should accommodate business need above all else. There are many factors to consider when designing and deploying an Application Delivery Network around business needs, and F5 addresses those requirements throughout the data center.

Enabling IT Agility with the F5 BIG-IP System and the VMware vCloud Platform | Overview

Data center virtualization has reached maturity, and users are now looking for ways to implement virtual infrastructures to continue the migration of virtualization to private cloud. This demand, driven by the ease of infrastructure implementation and the promise of reduced human error, is met by F5 and VMware integrated solutions.

Operationalizing Elastic Applications | Overview

The continued virtualization of the data center coupled with the adoption of private and hybrid cloud computing models is driving a need for more automation and orchestration. An integrated F5 and VMware solution offers organizations improved reliability and consistency in application deployments as well as improved operational efficiency.

The BIG-IP System and Message Assurance for Low Latency Financial Information eXchange (FIX) | Overview

The FIX protocol used by financial institutions to facilitate trading requires fast, reliable, and consistent response times that bring new meaning to high speed and availability. F5 BIG-IP products ensure high availability, improve performance, and enable flexible authentication for financial services organizations implementing the FIX standard.

Enable a Scalable and Secure VMware View Deployment | Overview

A FlexPod data center design complemented by F5 ADCs supports a scalable VMware View solution, as demonstrated and validated by Trace3 and F5.

Application Delivery in the Cloud: Minimizing Disruption and Maximizing Control | Overview

Whether serving applications in a traditional or cloud environment, IT organizations want to do so with minimum user disruption and maximum control and manageability. F5 solutions support and enhance application delivery in the cloud, such as in VMware-based solutions, just as they do in traditional environments: by ensuring security, availability, and scalability.

Application Delivery Optimization | Overview

Fueled by users who are hyper-sensitive to delays in application delivery, organizations are seeking solutions that can help them root out and eliminate delivery latency. Application Delivery Optimization promises to improve application performance in the data center and beyond.

Accelerating Mobile Access | Overview

Mobile devices are proliferating, and their use to access applications is skyrocketing, while users are less accepting of application performance issues than ever before. Since mobile devices have limited bandwidth, IT departments need to implement services that will speed access to web applications while expanding the devices these applications support.

Boosting Operational Efficiency by Streamlining File Storage Management | Overview

Managing file storage consumes resources, causes downtime, and places an added burden on administrators. Virtualizing the file storage environment can dramatically simplify day-to-day management, increasing efficiency and enabling administrators to focus on other business-critical initiatives.

IBM and F5 workload optimization on the new IBM PureFlex System | IBM White Paper | Overview

High availability and resource optimization are paramount to application delivery and adoption. IT managers and their infrastructures can take advantage of the unique capabilities of the F5 BIG-IP Local Traffic Manager (LTM) and IBM PureFlex System architecture to design a highly available and optimized platform for their mission-critical applications. This paper explains the joint work from IBM and F5 Networks to produce this platform.

Securing Banks in Changing Times | Overview

The financial services industry (FSI) is facing significant pressure from customers, competitors, and governments to secure and improve all types of networked applications while meeting customer demand for increased channel access and complying with new regulations. FSI IT departments need a holistic solution that helps with these specific issues while making the overall architecture more stable, secure, and adaptable. F5 ADCs can speed compliance and time to market while increasing website security.

Complying with PCI DSS | Overview

The Payment Card Industry Data Security Standard (PCI DSS) is a uniform, minimum set of security requirements for processing, transmitting, and storing cardholder data. The 12 PCI DSS requirements satisfy a variety of security goals related to network security, protecting stored cardholder data, vulnerability management, strong access control, network monitoring and testing, and information security policies. Organizations that want to comply with PCI DSS can protect their web application infrastructures and make significant progress toward compliance by implementing F5 technologies. F5 products can help with all of the core PCI DSS areas and 10 of its 12 requirements.

Load Balancing Oracle Database Traffic | Overview

Load Balancing Oracle Database Traffic

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution | Overview

Application-level distributed denial-of-service (DDoS) attacks are on the rise and popular specifically because it’s a challenge to completely protect against them. The application layer is vulnerable to a wide range of threats, including relatively unsophisticated attacks that can nonetheless bring a web application to its knees. Fortunately, by focusing on how users interact with applications in real-time and how those applications are delivered over the network, application and network administrators can work together to detect and protect against DDoS threats. The appropriate Application Delivery Controller (ADC) can serve an invaluable role. Specifically, F5® BIG-IP® Application Security Manager™ (ASM) can detect and protect against an attack in real-time by detecting that an application is under attack, identifying attacker information, and effectively mitigating the attack.

The DDoS Threat Spectrum | Overview

As the world becomes increasingly connected electronically, the potential for inadequate client control in emerging market territories increases. Malware can infect these clients, which can be directed by centralized command-and-control servers to become “botnets” that can be rented cheaply by any party with an interest in disrupting the service of a competitor or political target. Today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often all at the same time. Though DDoS attacks have been with us for decades, the scope, nature, and magnitude of the DDoS threat spectrum have evolved significantly over time, and the security response must evolve as well.

Performing Non-Disruptive Data Migration with Intelligent File Virtualization | Overview

Data migrations are a common occurrence for many organizations as they manage growing amounts of file data. Intelligent file virtualization is an elegant solution that reduces the disruption, operational overhead, and risk inherent with any type of data migration project.

Meeting the Challenges of an HA Architecture for IBM WebSphere SIP | Overview

Voice and multi-media features available in IBM WebSphere Application Server enable a new generation of integrated applications but also introduce new challenges for IT staff. The inclusion of F5 BIG-IP LTM as a core component of a high availability SIP deployment addresses those challenges without increasing network complexity.

Top Considerations When Choosing an ADC | Overview

The Application Delivery Controller (ADC) chosen as the foundation for a flexible, efficient application delivery strategy can significantly affect network performance, availability, and security while providing opportunities to add business value.

Unified Communications Needs Unified Infrastructure | Overview

Disconnected management of communication protocols in UCS deployments can disrupt performance and availability and lead to higher operational costs. An F5 UCS solution ensures resiliency and performance while maximizing operational efficiency.

Unified Enterprise Mobility with the F5 BIG-IP System | Overview

Enterprises need to unify mobility with their existing corporate access and security policies. Combining F5 BIG-IP Access Policy Manager (APM) with mobile device management (MDM) solutions, the latest mobile OS controls from Apple, Android, and virtual desktops, reduces enterprise mobility deployment costs and minimizes complexity while bringing unparalleled scale, security, and control.

Secure Mobile Access to Corporate Applications | Overview

The way corporations operate around mobile devices is currently shifting—employees are starting to use their own devices for business purposes, rather than company-owned devices. With no direct control of the endpoints, IT departments have generally had to prohibit this or risk insecure access inside the firewall. But as more mobile devices appear on the corporate network, mobile device management has become a key IT initiative.

Extending data center networks to the IBM SmartCloud | IBM White Paper | Overview

Optimizing performance and agility while delivering better service.

Improving VDI with Scalable Infrastructure | Overview

As virtual desktop infrastructure (VDI) has become more prevalent, point solutions have emerged to address associated delivery issues. These solutions burden IT infrastructure, but with little benefit. Organizations need a solution that can offer added security, network performance improvements, and vendor-specific optimizations, all while improving architecture for non-VDI systems.

Adaptable and Resilient VDI Deployments | Overview

As the impetus to begin a virtual desktop infrastructure (VDI) deployment has grown in recent years, VDI solutions have begun to proliferate in the market. These solutions range from new features and functionality offered by market leaders to point products from smaller players that cater to enterprises’ VDI needs. A complete VDI solution should deliver a reliable, high-performing desktop user experience while taming complexity and supporting scalability within a secure, stable framework.

Secure Access with the BIG-IP System | Overview

Rapid growth of the mobile and remote workforce is driving organizations’ need to support tens of thousands of concurrent users on a single appliance. To this end, F5 developed a high-performance, high-concurrency SSL VPN in BIG-IP Edge Gateway and BIG-IP Access Policy Manager (APM) to help enterprise IT migrate existing remote access solutions.

Optimizing Data Backup with Intelligent File Virtualization | Overview

Despite the advent of snapshot and other disk-based backup technologies, tape backup remains an integral component of data protection for enterprises. Intelligent file virtualization integrates with existing backup solutions to optimize tape-based data protection in today’s enterprise.

IBM and F5 Cloud Reference Guide | Overview

IBM and F5 Cloud Reference Guide

Carrier-Grade Network Address Translation (CGNAT) | Overview

As the supply of IPv4 addresses is rapidly depleting, communication service providers are employing unique solutions to optimize current networks and transition to IPv6. One of the more successful solutions organizations are using to address this issue is carrier-grade network address translation (CGNAT). The F5 BIG-IP system provides unique scalability and flexibility to the CGNAT architecture, enabling service providers to offer more reliable and available service to their subscribers.

Strategic Solutions for Government IT | Overview

The U.S. government wants to transform its IT organization to streamline operations and smooth the transition to the data center of the future. To this end, it is moving an increasing number of applications to the cloud; minimizing duplicated IT efforts; and improving the dialogue between federal providers and contracting personnel—all with the goal of making government IT resources more flexible, reliable, and secure.

APT Dot Gov: Protecting Federal Systems from Advanced Threats | SANS White Paper | Overview

Why do attackers target federal systems? They seek intelligence, advantage and political gain. The possibilities are endless: intelligence about an opponent’s military capabilities, movement of high-value individuals or national economic strategies; advantage by disabling or crippling sensors and systems or prelaunching a cyber attack as a prelude to kinetic warfare; and political gain by embarrassing a rival, manipulating public perception prior to a key election, or suppressing suspected dissident citizen groups.

F5 BIG-IP Platform Security | Overview

F5 BIG-IP system hardware and software, which use the F5 TMOS operating system, are designed from the ground up to work together to provide total application security.

F5 and RSA SecurID: Supporting NSA Guidance | Overview

A 2011 breach of RSA networks resulted in a loss of data that could pose a threat to RSA SecurID two-factor authentication. F5 BIG-IP Application Security Manager (ASM) and BIG-IP Access Policy Manager (APM) support the implementation of NSA recommendations for mitigating potential threats.

Microsoft SharePoint Server 2010 Performance Study | Dell Technical White Paper | Overview

Microsoft SharePoint Server 2010

Security 101: BIG-IP ASM and IPS Differences Defined | Overview

Industry experts have long debated which is a better defense mechanism in defending against Internet based attacks: a web application firewall (WAF) like F5 BIG-IP Application Security Manager (ASM) or an intrusion detection or prevention system (IDS/IPS). But the most ideal scenario would include a WAF and an IDS/IPS. The key to a successful security plan is not to provide the best security at one layer, but the best security at all layers.

Introducing Data Manager | Overview

F5 Data Manager helps enterprises monitor their heterogeneous file storage environments and understand how and why their file data is growing over time. With Data Manager’s unique software architecture, process workflow, and reporting tools, organizations can better manage file usage and storage.

Speeding Oracle Database Replication with F5 WAN Optimization Technologies | Overview

Companies around the world recognize the importance of protecting business data from disaster, hardware failures, human error, or data corruption. Oracle provides a variety of strategic solutions to safeguard databases; manage backup, replication, and restoration; and ensure availability of mission-critical information. These Oracle 11g Database Replication Solutions include Oracle Data Guard, Oracle GoldenGate, Recovery Manager, and Oracle Streams.

Using Strategic Points of Control to Optimize the Application Infrastructure | Overview

Application performance depends on much more than speeding communication between the browser and the server. Modern application infrastructures include storage, the WAN connection, and the minute-by-minute workload on both. If the application front end is accelerated but the behind-the-scenes architecture is slowing application response time, then much of the value of any front-end investment is lost. By optimizing strategic points of control in the network, F5 products can help an enterprise leverage those front-end investments, accelerate the entire application infrastructure, and introduce a layer of agility that is just not possible with traditional architectures.

Secure, Optimized Global Access to Corporate Resources | Overview

Global access to corporate applications is critical to an organization. The range of users, devices, and their locations requires stringent application access control to securely connect any user on any device from any location to wherever the application lives.,x-default

Maximizing the Strategic Point of Control in the Application Delivery Network | Overview

Improve performance, implement security procedures, and institute server redundancy that is invisible to the user by leveraging the strategic point of control that exists between the servers in the data center and the Internet.

Application Security in the Cloud with BIG-IP ASM | Audio | Overview

Whether critical applications live in the cloud, in the data center, or in both, organizations need a strategic point of control for application security. F5 BIG-IP Application Security Manager (ASM) provides the security, intelligence, and performance that today’s dynamic infrastructure demands.

F5 iApps: Moving Application Delivery Beyond the Network | Overview

Traditional application delivery has focused on how to manage the network for applications. F5 iApps is a revolutionary new way of focusing on how to manage application delivery through the network, thereby changing how applications are delivered across the data center.

Simplifying Single Sign-On with F5 BIG-IP APM and Active Directory | Overview

Implementing single sign-on supported by Active Directory to manage application access in multi-domain environments across a diverse set of devices, applications, and services is challenging. An F5 BIG-IP APM and Microsoft Active Directory solution simplifies operational configuration while consolidating identity and application access management.

The F5 Dynamic Services Model | Audio | Overview

F5 believes a new approach to infrastructure design must emerge—one that enables enterprises to add, remove, grow, and shrink IT services on demand, regardless of location. This new infrastructure must dynamically optimize the interaction between users and resources in the face of rapidly changing conditions. It must allow the IT enterprise to adapt quickly to changing organizational demands for security, data protection, ease of access, market responsiveness, low cost, and high performance.

Managing IPv6 Throughout the Application Delivery Network | F5 White Paper | Audio | Overview

This White Paper describes how the BIG-IP LTM system help organizations migrate to IPv6, and can operate as an IPv4 to IPv6 gateway; operating identically in either environment, and within mixed environments. This capability is ideal for organizations that are either actively planning for or anticipating an IPv4 to IPv6 transition.

Building a Cloud-Enabled File Storage Infrastructure | Overview

A cloud-enabled infrastructure can help your organization seamlessly integrate cloud storage and maximize cost savings, while also offering significant benefits to your traditional file storage environments.

Enhancing Application Availability with F5 and NetApp | Overview

Leverage F5 and NetApp technologies to improve VMware application availability, enhance disaster avoidance, and simplify storage migration via long distance live migration.

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall | Audio | Overview

Organizations need an end-to-end web application and database security solution to protect data, customers, and their businesses. The integrated solution from F5 and Oracle provides improved protection against SQL injection attacks and correlated reporting for richer contextual information.

Building an Enterprise Cloud with F5 and IBM | Overview

Building a dynamic, agile enterprise cloud can be a daunting task. F5 and IBM have created a reference architecture that will accelerate the design and deployment phases and help ensure a successful enterprise cloud architecture.

Why You Need a Cloud to Call your Own | Overview

Private cloud computing may not offer the same degree of cost savings as public cloud computing, but greater flexibility and time savings will outweigh less significant cost savings in the long term. A joint F5-IBM cloud computing solution based on proven technology and standards can help you get to the private cloud faster.

Streamlining Oracle Web Application Access Control | Audio | Overview

Web application security is critical—the data that web servers and their back-end databases house is invaluable to an enterprise. An organization must be able to control who can access their resources and when, as well as audit that information. F5 BIG-IP Access Policy Manager (APM), in conjunction with Oracle Access Management (OAM), helps centralize web application authentication and authorization services, streamline access management, and reduce infrastructure costs.

Accelerating the Adoption of Public Storage Clouds By Enterprise Organizations | DCIG White Paper | Overview

Public storage clouds are viewed less than favorably by enterprise organizations even though many of them foresee adopting public storage clouds in the not-too-distant future. Changing that viewpoint requires that service providers bring forward public storage cloud offerings that possess seven key attributes that will sway the opinion of enterprise decision makers and prompt them to adopt public storage clouds sooner rather than later.

Simplifying Disk-Based Backup and Restore with NetApp and F5 ARX | Overview

F5 ARX solutions complement NetApp SnapMirror and SnapVault technologies to provide simple and effective data protection across virtualized file storage environments.

Achieving Enterprise Agility in the Cloud | Overview

Cloud computing continues to be one of today’s most intriguing IT technologies, yet enterprises are still weighing whether it can help them achieve their business goals. Working together, VMware, F5 Networks, and BlueLock offer integrated solutions that help enterprises develop agility so they can easily and efficiently use cloud resources on demand to meet their changing needs.

Network Services and the Cloud | Overview

To fully maximize the potential of virtualization and the cloud, organizations must take a more holistic approach to their Application Delivery Network. The F5 dynamic services model provides a foundation of reusable services that can understand the context of each transaction regardless of user, device, or location. The IBM Services portfolio leverages F5 products to align business requirements with technology.

Optimizing Application Delivery in Support of Data Center Consolidation | Audio | Overview

By architecting data center infrastructure to be as nimble and agile as possible, IBM and F5 enable enterprises to better react in real time to customer requirements and to position the customer for success. The combined strength of IBM and F5 tackles these challenges at the core of the infrastructure by creating a strategic point of control where the network, servers, storage, and security come together to create customized solutions that add significant business value.

Secure iPhone Access to Corporate Web Applications | Audio | Overview

This technical brief describes how the BIG-IP Edge Portal app for iOS devices provides simple, streamlined access to web applications that reside behind BIG-IP APM, without requiring full VPN access, to simplify login for users and provide a new layer of control for administrators.

Hardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance | Overview

A comprehensive F5 solution readies application infrastructure for a successful implementation of there-engineered Microsoft Exchange Server 2010.

F5 and Microsoft Delivering IT as a Service | Overview

This paper provides a blueprint for integrating F5’s BIG-IP Application Delivery Controller (ADC) with Microsoft System Center to establish a dynamic network infrastructure. By making the network visible to System Center, System Center can automatically manage application load optimization policies.

Application Delivery Hardware: A Critical Component | Audio | Overview

Application Delivery Controllers (ADCs) come in a variety of hardware and software combinations, but mission-critical application delivery demands mission-critical ADC hardware.

Intelligent Layer 7 DoS and Brute Force Protection for Web Applications | Audio | Overview

Both Denial-of-Service (DoS) and Brute Force Attacks have existed for many years, and many network devices tout the ability to withstand them. However, most of today's DoS attacks target layer 7 (L7) by overwhelming applications with seemingly valid requests and Brute Force programs can send more than one million attempts per second. This paper will discuss how to intelligently mitigate these types of attacks.

Data Centre Consolidation: Know Where You're Going and Why | Audio | Overview

Effective consolidation means more than simply reducing the number of boxes your company has in outlying offices and data centres. Efforts to reduce hardware infrastructure often result in degraded application performance-and thus unplanned expenditure-as it becomes necessary to optimise the infrastructure. F5's open architectural framework allows real control over your network to ensure applications are delivered exactly as intended.

Driving Data Migration with Intelligent Data Management | Overview

F5 and NetApp are reducing the cost and complexity of managing file storage. F5 ARX complements and enables transparent migration to the wide range of NetApp storage solutions.

Investing in security versus facing the consequences | Bloor Research White Paper | Overview

The problems of DNS security have long been known, which is why DNSSEC was developed. However, it is only now that widespread deployment is possible as the internet infrastructure is being readied to accept DNSSEC lookups and tools are available to remove the complexity involved in its deployment.

Delivering Virtual Desktop Infrastructure with a Joint F5-Microsoft Solution | Audio | Overview

The benefits of moving to a virtual desktop infrastructure can easily be negated by an unreliable or poorly performing implementation. A joint F5-Microsoft solution can improve performance, increase reliability, and enable the seamless scalability of a Microsoft VDI implementation.

BIG-IP WAN Optimization Module Performance | Overview

Performance guidelines and testing results for the BIG-IP WAN Optimization module

Load Balancing 101: Firewall Sandwiches | Audio | Overview

There are many advantages to deploying firewalls, in particular, behind Application Delivery Controllers. This white paper will show how you can implement ADCs in a “firewall sandwich” to improve availability, scalability, and manageability across the IT infrastructure.

Deploying F5 Application Ready Solutions with VMware View 4.5 | Audio | Overview

F5 offers a variety of Application Ready Solutions to help organizations maximize the success of VMware View desktop projects. As a VMware partner, F5 has thoroughly tested and documented the benefits of using our Application Delivery Networks with VMware View 4.5. F5 solutions include secure access, single- sign-on, load balancing, and server health monitoring.

Authentication 101 | Audio | Overview

Authentication is a growing requirement in this new era of heightened technology security. What is authentication and how can it be implemented in your environment to meet all of your application needs?

Kerberos Constrained Delegation and Protocol Transition in Smart Card PKI Architecture | Audio | Overview

F5 BIG-IP LTM with ACA in Kerberos protocol transition and constrained delegation architectures allows for a more scalable, efficient and secure infrastructure capable of federating access to services across domains and authentication realms, ultimately decreasing the capital and operational expenditures required to keep applications secure, fast, and available.

Unleashing the True Potential of On-Demand IT | Audio | Overview

F5’s dynamic control plane is a real-world embodiment of the dynamic services model. F5 solutions provide IT organizations the ability to grow beyond static data centers, manage movement and migration of their applications and data down the hall or around the world, support demanding and ever-increasing mobile users, offer centralized and consistent security enforcement and global, dynamic measurement of real-time application performance. With this approach, F5 customers are better equipped to mitigate the complexity and costs of the move toward cloud computing, enabling them to unleash the true potential of on-demand IT.

Providing Security and Acceleration for Remote Users | Audio | Overview

Delivering applications to remote users is a significant undertaking. Applications need to be available, and they must be delivered securely and quickly. Through a range of products, F5 has solved the security plus acceleration challenge for remote users with BIG-IP Edge Gateway and BIG-IP APM.

BIG-IP Virtual Edition Products„The Virtual ADCs Your Application Delivery Network Has Been Missing | Audio | Overview

Although software-based Application Delivery Controllers (ADCs) running within virtual machines have been available for some time, the F5 BIG-IP Local Traffic Manager (LTM) Virtual Edition (VE) is a full-featured vADC designed to work as an extension your existing physical F5 BIG-IP hardware appliances.

The F5 Powered Cloud | Audio | Overview

F5 products and solutions enable organizations and cloud providers alike to build a strong infrastructure foundation that maximizes the use of resources while remaining agile enough to support both traditional and cloud computing architectures. The dynamic nature of F5 products enables organizations to build a cloud computing architecture that best suits their needs—whether the end goal is a public cloud offering or a private cloud implementation.

The Optimized and Accelerated Cloud | Audio | Overview

As more organizations begin moving applications into the cloud, congestion will become an increasingly critical issue. F5 offers solutions for optimizing and accelerating applications in the cloud, making them fast and available wherever they reside.

Availability and the Cloud | Audio | Overview

Cloud computing offers IT another tool to deliver applications. While enticing, challenges still exist in making sure the application is always available. F5’s flexible, unified solutions ensure high availability for cloud deployments.

Securing the Cloud | Audio | Overview

Cloud computing has become another key resource for IT deployments, but there is still fear of securing applications and data in the cloud. With F5 devices, you can keep your most precious assets safe, no matter where they live.

F5 and Infoblox DNS Integrated Architecture | Overview

As market leaders in the application delivery market and DNS, DHCP, and IP Address Management (DDI) market respectively, F5 and Infoblox have teamed up to provide customers with a complete DNS solution. This solution provides superior DNS management capabilities, flexible intelligent global server load balancing, high performance scalable DNS, and complete DNSSEC signing for all zones.

Creating a Hybrid ADN Architecture with both Virtual and Physical ADCs | Audio | Overview

The virtualization of network and application network infrastructure is the second wave of the virtualization tsunami to hit the shores of the data center. Unlike server virtualization, because of its unique role in the data center, Application Delivery Controller (ADC) virtualization brings with it architectural implications that make a simple virtual-for-physical replacement strategy unacceptable. But there are appropriate places across the data center and organization where virtualized ADCs can be leveraged as stand-alone solutions, as well as in conjunction with its physical predecessor, to enable a more dynamic data center without compromising reliability, scalability, and performance.

Controlling the Cloud: Requirements for Cloud Computing | Audio | Overview

F5 Networks' perspective on cloud computing: definition, architecture, and development. Cloud computing is not a revolution. It is an evolution that has been ongoing for well over a decade, if not since the very beginning of electronic computing. The cloud is simply an architectural model that employs many of the same components used in datacenters around the world today in a more flexible, responsive, and efficient way. The primary difference is in how these components are tied together with a dynamic control plane which helps enlighten and inform the architecture about the rapidly changing requirements of today’s applications, data and clients.

BIG-IP Version 10.1: An Integrated Application Delivery Architecture | Audio | Overview

As an advanced ADC, F5 BIG-IP v10.1 provides sophisticated, integrated, contextual application management on a single platform. This modular architecture enables IT departments to make the most of their application delivery infrastructure, saving capital and operational costs through the lifespan of the application. As data centers continue to grow in complexity and shrink in footprint, integration of services will become a critical component during planning and execution. F5 BIG-IP v10.1 provides the level of integration today’s IT departments need to manage and control application delivery for users and services throughout the data center.

Unified Access and Optimization with F5 BIG-IP Edge Gateway | Audio | Overview

BIG-IP Edge Gateway is a game changer in the secure connectivity market, providing the next generation of highly scalable integrated remote access and advanced acceleration capabilities. BIG-IP Edge Gateway brings together necessary edge services, remote access, site-to-site security, WAN optimization, and web acceleration. BIG-IP Edge Gateway gives you secure, accelerated, and highly available applications around the world—whether at home on the road.

Manageable Application Security | Audio | Overview

Information security personnel suffer from information overload on a nearly daily basis, but need to sift through myriad articles, reports, blogs, logs, and scans to do their jobs. Information is vital to successful web application security strategies, whether it be information about a new attack, a new twist on an existing attack, or identifying weak points in web applications. Investments in security solutions have to provide a clear value, which equals additional time spent collecting and documenting proof of this value. The latest version of F5 BIG-IP Application Security Manager(tm) (ASM), v10.1, addresses information overload and the need for agility in implementation.

Creating Virtual Snapshots with F5 ARX | Overview

Storage snapshot technology is the foundation for modern data protection in the enterprise. The F5® ARX® file virtualization solution coordinates and federates snapshots across heterogeneous devices and volumes to simplify management and data protection in virtualized file storage environments.

Managing BIG-IP Devices with HP and Microsoft Network Management Solutions | Audio | Overview

By working collaboratively with partners that build some of the most widely deployed network management tools in the industry, F5 provides the bridge between application system and network infrastructure management. Using third-party tools such as HP Network Node Manager i and Microsoft System Center Operations Manager, it has never been easier to manage F5 BIG-IP devices.

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks | Audio | Overview

DNSSEC ensures that the answer you receive when asking for name resolution comes from a trusted name server. Since DNSSEC is still far from being globally deployed and many resolvers either haven’t been updated or don’t support DNSSEC, implementing the BIG IP GTM DNSSEC feature can greatly enhance your DNS security right away. It can help you comply with federal DNSSEC mandates and help protect your valuable domain name and web properties from rogue servers sending invalid responses.

Message-Based Load Balancing | Overview

The ability to load balance some protocols requires a deep understanding of the way in which the applications that use those protocols behave. Protocols that are both asynchronous and communicate bidirectionally are challenging to scale for most load balancing solutions because they do not have the ability to extract and route requests at a message level and are inherently tied by their architecture to load balancing based on connections. F5 TMOS architecture provides the means by which F5 is able to quickly implement support for message-based protocols such as Diameter, RADIUS, and LDAP. TMOS enables BIG-IP Local Traffic Manager to extract and act upon message-level information, providing turnkey scalability and high availability while maintaining the ability to extend and adapt that functionality through iRules.

Application Delivery and Load Balancing for VMware View Desktop Infrastructure | Overview

Deploying VMware View with Dell servers and F5 BIG-IP Local Traffic Manager using the features and best practices described in this paper can help ensure that the virtual desktop infrastructure is secure, scalable, flexible and available.

Create a Smarter Storage Strategy | Audio | Overview

This paper explores why it is important to have deep insight into your file storage environment, and offers tips on how to develop a storage strategy that best meets your organization's needs. It also looks at how storage reporting and capacity forecasting tools can help you create a smarter storage strategy by automating the critically important but time consuming process of data capture and analysis.

Optimizing VMware View VDI Deployments | Audio | Overview

F5 BIG-IP Local Traffic Manager helps reduce the impact on the WAN from VDI by working with VMware's client and server components and optimizing the connection between users and their VDI virtual machines. When deployed in a branch scenario, BIG-IP LTM, iSessions, and BIG-IP WOM can control the amount of data that is passed back and forth between the branches, removing redundant application data and optimizing unique data for the client desktop.

Global Distributed Service in the Cloud with F5 and VMware | Audio | Overview

By working with VMware and by providing a robust Application Delivery Networking infrastructure for virtual machines and platforms, F5 BIG-IP LTM and BIG-IP GTM provide the backbone for application delivery inside and out of the cloud with solutions such as vCloud. BIG-IP products work in concert across the entire application stack—from BIG-IP LTM monitoring application health and managing local user connections through BIG-IP GTM distributing those connections across the globe. Together, they deliver applications running in the cloud on VMware virtual platforms to meet changing business needs.

Enabling Long Distance Live Migration with F5 and VMware vMotion | Audio | Overview

This integrated solution between F5 and VMware enables long distance VMotion for the first time between data centers and clouds. The solution works with your existing network and IT infrastructure; it does not require a re-architecture of your local or remote networks. This seamless solution uses existing technologies from both F5 and VMware to enable transparent live VM migration over long distances, guaranteeing the applications are migrated in a secure and optimized manner and always remain available before, during, and after the VMotion migration. Moving your applications and services transparently between clouds is now possible with F5 and VMware.

Microsoft Office Communications Server 2007 R2 Site Resiliency | Overview

The Backup and Restoration documentation for Microsoft Office Communications Server 2007 R2 (http://technet.microsoft.com/en-us/library/dd572319(office.13).aspx) includes guidelines and best practices for Microsoft Office Communications Server 2007 R2 disaster recovery.

Reducing Storage Costs with F5 ARX | Audio | Overview

F5 ARX solutions dramatically reduce capital and operating expenses associated with managing file storage environments. Companies that have deployed ARX solutions have realized significant cost savings in several ways, including through greater use of lower cost storage with storage tiering, reduced backup media consumption from backup optimization, improved resource utilization, and simplified storage administration.

Seven Data Center Challenges to Consider Before Going Virtual | Audio | Overview

One of the pillars of the Virtual Data Center is virtual platform infrastructure, or the virtual machine; however virtual platforms are dependent on many other, oft forgotten components of both the physical and virtual data center. This White Paper details seven data center challenges before deploying a virtual data center.

F5 ARX and Data Domain Deduplication Storage | Overview

Storage tiering helps businesses cut costs by automatically migrating aged or reduced-value files to lower-cost storage. Combining file virtualization with deduplication storage provides a simple, fast, and economical path to effective storage tiering. This paper reviews best practices for integrating Data Domain and F5 solutions for long-term archiving and data protection.

Application Delivery Network Platform Management | Audio | Overview

To address the management needs of any environment along with managing each individual component of the ADN holistically, F5 has created four unique solutions to address any management scenario. Although each solution is designed to address a particular need, all of the solutions work together to provide limitless options for managing a full-featured ADN.

Scaling SIP | Audio | Overview

This paper addresses the challenges and solutions when providing high-availability and scalability for SIP services. By choosing the right high-availability solution for SIP environments, organizations can ensure reliable services while maintaining the ability to rapidly support new functionality and infrastructure without sacrificing uptime or quality.

Unified Application and Data Delivery | Overview

This paper outlines F5's vision for a new approach to Unified Application and Data Delivery Services, explores the business benefits of such an approach, defines an architecture to deliver those services, and outlines a roadmap for implementation.

Application Ready Solution Templates | Audio | Overview

F5's Application Ready Solution Templates are designed to ensure that the savings realized through consolidation are protected by reducing the time, effort, and application-specific knowledge required of administrators to optimally deploy applications that are secure, fast, and available through the use of BIG-IP devices.

Optimizing the Business of IT | Audio | Overview

New functionality in BIG-IP v10--such as resource provisioning and route domains--coupled with existing administrative domain capabilities enables IT to virtualize application delivery functions across departments. Sharing the investment in a unified application delivery solution across business constituents increases the return on investment while reducing the complexity inherent in managing multiple devices.

F5 BIG‑IP v10 | Audio | Overview

The enhancements and new features available in BIG-IP v10 make this one of the most exciting new releases of an Application Delivery Controller in many years. The move toward a unified, adaptable dynamic infrastructure cannot be achieved without many of the innovative new features available in the new version of the BIG-IP system and the enhancements to its manageability make BIG-IP v10 more efficient than ever.

Unified Application Delivery | Audio | Overview

By providing a unified Application Delivery Networking platform, F5 BIG-IP offers the ability for organizations to adopt a single platform for all its application delivery needs. Adopting an organizational standard for application delivery can reduce management and administrative costs and improve the ability of the organization to migrate smoothly from traditional to emerging application architectures, and address the unforeseen issues that always arise in the wake of the introduction of new initiatives.

Inband Passive Monitors--Maintain Application Performance and Health | Audio | Overview

Application health monitors are now a tried and true technology of the Application Delivery Controller, yet traditional monitors require interaction with the application. Inband passive monitors change that requirement and monitor applications transparently.Inband passive monitors finally fuse together intelligence and performance; it's no longer an "or" decision, now it becomes an "and," enabling both application intelligence and performance to co-exist.

Resource Provisioning--Hardware Virtualization, Your Way | Audio | Overview

BIG-IP resource provisioning combines the best features of each virtualization model by enabling BIG-IP LTM modules to run sandboxed without sharing resources, while giving them the ability to dynamical scale if/when needed. Resource provisioning is a new model in hardware virtualization, one that will change the face of application delivery and Application Delivery Controllers moving forward.

BIG‑IP Live Install and Logical Volume Manager | Audio | Overview

BIG-IP devices have long been a tool for applying "rolling upgrades" to the applications and systems that sit behind the BIG-IP device. With Live Install, this "stage->reboot->go live" sequence can now be applied to the BIG-IP device directly, creating a rolling upgrade scenario like those of the application systems behind it. Live Install also enables snapshot versioning for future versions of the BIG-IP system, a critical feature for both production and testing environments.

F5 iControl | Audio | Overview

iControl provides the means by which F5's BIG-IP platform can be automated, integrated, and flexible such that it can adapt in real-time to changing network and application infrastructure conditions inside and outside the data center. Whether you are building out a new infrastructure or adapting to new technology, using iControl can enable unprecedented levels of control over and visibility into the application delivery process.

F5 White Paper: Simplifying Application Access Strategries | Audio | Overview

Unified, ubiquitous access has historically been out of reach and enterprises are clamoring for a single appliance to handle all their secure access needs. Typically companies needed multiple single purpose devices to handle their access needs...until now. This white paper discusses unified access strategies, challenges and solutions within the network and access management industry. It defines the depth and breadth of the challenges with current access needs and how new solutions may solve them.Unified Access

F5 FirePass Endpoint Security | Audio | Overview

As SSL VPN technology becomes more mainstream and organizations extend their internal infrastructures to users who are not necessarily employees, Endpoint security has become an increasing concern. Allowing an infected device access onto the network is just as bad as allowing an invalid user to access proprietary internal information. This White Paper describes how F5 FirePass Endpoint Security prevents infected PCs, hosts, or users from connecting to the network, and much more.

Built to Scale | Audio | Overview

There are three proactive measures you can take during the development of an application to ensure it is secure, fast, and available when it hits superstar status.

Automated Application Acceleration | Overview

Fast, reliable access to data is a necessity in enterprise file storage environments today. However, many environments are beset by bottlenecks that slow application performance and negatively impact productivity. While these problems are particularly acute in dataintensive environments such as digital media, electronic design automation, oil and gas, and financial analysis, they are not unique to such environments and impact many diverse applications across a wide range of enterprises.

Get to Know GPO | Audio | Overview

This paper covers the F5 FirePass integration with FullArmor's GPAnywhere. FullArmor is a leading provider of enterprise policy management on the Microsoft Windows platform. This paper also details Group Policy Objects.

7 Virtualization Challenges | Overview

To ensure the full potential of your virtual platform solution, you need to make sure your application and storage network is prepared to handle the added stresses of a virtual machine (VM) infrastructure. This White Paper describes how F5 technology enables your network to adapt to virtualization needs, ensure high availability (HA), maximize resources, and improve performance so you can get the most out of your investment.

VMware DRS: Why you still need assured application delivery networking | Overview

VMware Infrastructure products provide the next generation virtual platform for the new data center, but they don't virtualize the network or application delivery. This White Paper details how the F5 BIG-IP LTM works with VMware to provide truly virtualized Application Delivery Networking.

Virtual Data Center - Maturity Model Explained | Overview

This white paper describes the five different levels of virtual data center maturity progession.

Vulnerability Assessment Plus Web Application Firewall | Overview

This White Paper discusses new technology developed by WhiteHat Security and F5 Networks that enables organizations to immediately mitigate discovered vulnerabilities using a web application firewall.

Using the F5 ARX for Automated Storage Tiering | Overview

The amount of file data in the enterprise is growing at unprecedented rates. In addition, data is being retained for longer periods of time due to business and regulatory constraints. While not all this data is critical to the day-to-day business operations of the organization, it must all be stored, protected and remain readily accessible should the need arise.

SOA: Challenges and Solutions | Overview

The benefits of SOA (Service-Oriented Architecture) have been well documented, but the challenges associated with an enterprise wide SOA deployment have not. While the distributed nature of a SOA encourages reuse and provides a high level of agility for the business, it can also give rise to real challenges in the delivery of SOA-based applications.

What's New in BIG-IP ASM 9.4.2: XML Firewall Features | Overview

The introduction of BIG-IP Application Security Manager (ASM) version 9.4.2 marks a major step forward. This White Paper describes the new version of ASM and its new XML firewall features.

Aligning Application Infrastructure with Business through SOA Delivery | Overview

One of SOA's primary goals is to align IT with the business. F5's BIG-IP can and does assist in aligning IT with the business by enabling agility, mitigating risk, and encouraging reuse. As part of the IT infrastructure, these devices can improve overall performance, enhance security, and offload tasks from both servers and developers, providing quantifiable benefits over alternative solutions.

Impact of Web Services on the Network | Overview

Web services are definitely going to tax your network infrastructure. In the rush toward realizing the benefits of a Service Oriented Architecture via Web services, enterprise architects and developers must factor in the role the network plays in the successful delivery of Web services. This White Paper shows how F5 products can help reduce the burden of Web services on the network.

Security Solutions for Messaging Systems | Overview

With F5 solutions, organizations can provide employees with reliable and secure access to email, from wherever they are, no matter what type of device they're using. Employees can rely on email that is efficiently delivered, with minimal latency times and a dramatic improvement in performance. Organizations can also reduce their bandwidth expenditures, use fewer server resources, and lower their overall infrastructure costs.

Prevent your web site from being phished with iRules | Overview

Phishing scams have become a sad fact of life – but developers can stop them, with a little help. If you own F5’s BIG-IP Local Traffic Manager running version 9 or later, you already have the ability to make use of F5’s custom, in-line scripting language, iRules. And now there’s a new iRule available that has been designed to help stop phishing in its tracks.

Management Networks - Living Outside of Production | Overview

Many organizations choose to run data traffic and network management traffic over the same network links. This paper will discuss why it is critically important to segregate network management and control data traffic to ensure that problems can be solved even when the network is melting.

SOA Infrastructure Reference Architecture | Overview

The purpose of this paper is to document the infrastructure components and their relationships to each other-as well as to core SOA (Service Oriented Architecture) application components-that are necessary to enable the successful implementation of a robust SOA.

Cookies, Sessions, and Persistence | Overview

Cookies and sessions are the most useful hack invented, allowing HTTP to become stateful and applications to work on the web. But it is persistence that ties the two together and makes the web what it is today. This White Paper describes cookies, sessions and persistence, and the relationship between the three.

Automating the Data Center | Overview

This paper discusses an alternative architecture that supports data center automation and dynamic provisioning without operating system virtualization.

Getting Green | Overview

This paper discusses decreasing the impact of hardware on the environment and IT's bottom line through more efficient and better performing application delivery platforms.

Green IT: The Three "R"s | Overview

Applying the concepts of environmental-friendly policies to the data center through application delivery to green up your organization. If you’re truly interested in going green—whether environmentally, financially, or simply because you feel it’s the right thing to do—consider the benefits of an Application Delivery Controller. Going green isn’t just about devices and their power consumption; it’s about how much more efficient and green it can also make the rest of your infrastructure.

Architecting Highly Available ESB Services - A Healthier, Happier SOA | Overview

In order to ensure that services are highly available and reliable it may be necessary to adapt a strategy that includes technology designed specifically to address the availability, reliability, and scalability issues: an Application Delivery Controller (ADC).

Session Initiated Protocol Message-based Load Balancing | Overview

The ability to provide new and creative methods of communications has ensured an SIP presence in almost every organization. The F5's message-based load balancing ensures a good user experience by maintaining the connection from the user's device to the server, and enables growth and performance analysis while eliminating downtime.

Accelerating Data Replication with F5 WANJet and EMC MirrorView/Asynchronous | Overview

This paper addresses disaster recovery plans, common barriers to success, and performance gains that can be achieved by combining the F5 WANJet application acceleration solution with CLARiiON MirrorView/A replication solutions from EMC.

VDC Maturity Model - Moving up the Virtual Data Center Stack | Audio | Overview

The goal of virtualization in the data center is to help the enterprise achieve a business goal, whether that goal is consolidation, reduced management and head count costs, disaster recovery, or even “going green.” And with this, the pinnacle of virtual solutions is to architect and deploy the complete Virtual Data Center.

SNMP: Simplified | Overview

The Simple Network Management Protocol defines a method for managing devices that connect to IP networks. The "simple" in SNMP refers to the requirements for a managed device, not the protocol. This white paper defines the history, frequently used terms, and implementation of SNMP.

Enabling Flexibility with Intelligent File Virtualization | Audio | Overview

Organizations can leverage a highly versatile virtualization technology in their file storage infrastructures to enable data mobility; improve storage efficiency and reduce costs; and seamlessly integrate new technologies such as data deduplication and cloud storage.

Distributing Applications for Disaster Planning and Availability | Audio | Overview

Managing applications in multiple data centers in real time can be a challenge, especially when the data centers are geographically distributed. F5 products such as BIG-IP® Global Traffic Manager, BIG-IP Link Controller, and BIG-IP® WAN Optimization Module help you manage and distribute applications between data centers.

F5 and the 8 ways to Virtualization | Audio | Overview

F5 pioneered the concept of breaking up data center virtualization technologies into eight unique categories within the data center. Any virtualization products or technologies implemented in the data center will fall into one of these eight categories. With this paper, F5 discusses how it has implemented these same technologies within its own product line, helping enterprises get closer to achieving their goal of a implementing a complete Virtual Data Center with F5's Application Delivery Networking products.

VIPRION Clustered Multiprocessing | Overview

Because improvements in practical computer power lag far behind these exponential hardware improvements, the key to maintaining processor performance has become multiprocessor or multicore design. This White Paper details how the Clustered Multiprocessor (CMP) from F5, in combination with TMOS, provides customers with scalability, extensibility, adaptability, and manageability.

VIPRION: The Cost of Management | Overview

The new F5 VIPRION chassis brings not only performance and capabilities beyond today's demands, but also creates cost efficiencies that will appeal to accountants and management everywhere. This White Paper highlights some unexpected savings that the deployment of the VIPRION system brings to the table.

Fundamentals of HTTP | Audio | Overview

This White Paper shows how understanding HTTP, and how these headers control behavior of web-based applications, can lead to better end-user performance, as well as making it easier to choose an application acceleration solution that addresses the shortcomings of HTTP and browser-based solutions.

F5 Application Ready Network for Enterprise Service-Oriented Architecture | SAP White Paper | Overview

Together, F5 and SAP have thoroughly tested and demonstrated the benefits of the F5 Application Ready Network. Optimum performance of applications and the network leads to increased user adoption, satisfaction, and productivity. Ultimately, this means decreased costs and increased ROI for CIO’s and Business Application owners.

Optimizing Data Replication for Disaster Recovery | Overview

This white paper addresses the performance needs of data replication for disaster recovery, and the common barriers to achieving success. It also addresses the dramatic performance gains that can be achieved by combining the F5 WANJet application acceleration solution with the EMC Symmetrix Remote Data Facility (SRDF) family of remote storage replication solutions.

Conquering Multi-Homed ISP Link Challenges | Audio | Overview

This White Paper explores the challenges that businesses face when deploying a multi-homed network and how the BIG-IP Link Controller provides a cost effective solution to not only manage availability, but also to optimize the performance of ISP connectivity in an operationally efficient manner.

Bandwidth Management for Peer-to-Peer Applications | Overview

This White Paper describes how you can use F5 BIG-IP iRules and the Rate Shaping feature of the BIG-IP LTM system to identify different types of traffic for individualized control that can return double-digit capacity without spending a dime on additional bandwidth.

Optimize WAN and LAN Application Performance with TCP Express | Overview

F5's BIG-IP Local Traffic Manager provides a state-of-the-art TCP/IP stack that delivers dramatic WAN and LAN application performance improvements for real-world networks. This highly optimized TCP/IP stack, called TCP Express, combines cutting-edge TCP/IP techniques and improvements in the latest RFCs with numerous improvements and extensions developed by F5 to minimize the effect of congestion and packet loss and recovery.

SAP Network Services Best Practices | SAP White Paper | Overview

This document is intended to educate the reader on networking best practices and concepts for deploying SAP applications in today’s extended enterprise environment. The goal is to help application and network infrastructure departments to better cooperate during the earliest planning stages of SAP deployments to ensure these mission-critical applications are implemented in the most secure, reliable, and highest performing ways possible.

TMOS Secure Development and Implementation | Overview

TMOS -- the foundation and architecture for F5's application delivery controllers running on the BIG-IP platform -- brings a wealth of security to existing application delivery networks. But before the secure implementation of TMOS can be discussed, the question is often asked "How is TMOS itself secured?" This White Paper provides the answer.

Unified Approach for Securing Wireless, Remote, and Internal LAN Access | Overview

The F5 universal access approach is based on F5's FirePass product, Secure Sockets Layer Virtual Private Network (SSL VPN), which is integrated with F5's BIG-IP Local Traffic Manager. This integration establishes F5 as the only vendor in the industry that can unify and centralize security and access control for remote, wireless LAN (WLAN), and Local Area Network (LAN) users, while scaling to meet the throughput requirements for unified access.

Data Center Virtualization Q&A | Overview

This is a question and answer session with Erik Giesa, VP of Product Management and Marketing, on the topic of Data Center Virtualization.

TMOS: Redefining the Solution | Audio | Overview

This White Paper details F5's TMOS architecture, a collection of real-time features and functions, purpose-built and designed as a full-proxy solution with the power and performance required in today's network infrastructure.

Virtualization Defined - Eight Different Ways | Overview

This White Paper focuses on virtualization as it pertains to the data center. Before considering any type of data center virtualization, it's important to define what technology or category of service you're trying to virtualize. This White Paper describes eight different categories of virtualization so readers thoroughly understand the differences (and similarities) between the definitions of virtualization.

Unified Access and Application Delivery Methodology | Overview

This White Paper discusses the concept of Unified Access Control or Network Admission Control within the information security and network architecture industries. It defines the depth and breadth of the pitfalls with current architectures and how new solutions may solve them.

Offloading Remote Authentication for Servers | Overview

This White Paper details F5's Advanced Client Authentication software module. This module, for use with the BIG-IP Local Traffic Manager, provides client authentication of HTTP and other traffic types for a variety of authentication schemes, including LDAP, Radius, TACAS, SSL, and OCSP.

Impact of AJAX on the Network | Overview

This White Paper discusses the impact that AJAX has on the Network, and how an application delivery controller, such as the BIG-IP LTM system, combined with an application firewall address the network, server, and security issues that will certainly arise with increased deployment of these new web-oriented rich applications.

IPv6-101: Introduction | Overview

As the use of IPv6 within the Internet grows, the basic concept of IP address configuration and use becomes critical to all organizations. This White Paper gives a detailed introduction to IPv6.

Application Delivery Security: Integrated "Any App" Security | Overview

There are many unique challenges and pieces to application security that most devices today aren't able to provide. Most enterprises still want to provide application security with just a Web Application Firewall, ignoring the rest of the application security puzzle or leaving those duties to existing security appliances and controls. This White Paper describes application security, and discusses integrated security for any application.

Introduction to the Stream Control Transmission Protocol (SCTP) | Overview

The intent of this paper is to familiarize the reader with both the vision and need for SCTP. While it currently has a very limited use, its capabilities will soon prove too tempting, and SCTP adoption will grow quickly. Within IMS architecture, SCTP provides the call signaling over IP. The key benefits of SCTP, multi-homing and multi-streaming, will allow development of numerous new devices which include the ability to support and carry this new protocol.

Applied Application Security - Positive and Negative Efficiency | Overview

After many years of purely negative security provided by anti-virus scanners, IDS/IPS, and antispam engines, it's refreshing to hear that the positive security model - the basis for tried and true security devices like network firewalls and ACLs - is coming back in vogue. This White Paper discusses positive and negative security models and Web Application Firewalls.

Application Firewalls | Overview

This White Paper provides an overview of F5's Application Security Manager (ASM), an Application Firewall, and how it protects applications from hackers and other malicious attacks, and enforces granular security policies to protect web applications, as well as confidential information from both random and targeted application security attacks.

Securing Your Enterprise Applications with the BIG-IP | Overview

This White Paper describes how the BIG-IP system provides a holistic and integrated approach to securing your network and applications against potential application-level and network-level threats and attacks. The BIG-IP system is deployed as a critical gateway to your most precious resources: the applications and networks that run your business.

Web Application Vulnerabilities and Avoiding Application Exposure | Overview

Companies today are moving more and more of their mission-critical applications and data into web browsers. This paper explores some of the underlying reasons for the emerging vulnerabilities in web applications, illustrates some of the ways hackers commonly exploit them, and suggests a few ways in which companies can mitigate their risks.

HIPAA Security Compliance and F5 Solutions | Overview

HIPAA, The Health Insurance Portability and Accountability Act, requires healthcare organizations to take added precautions to ensure the security of their networks and the privacy of patient data. This White Paper provides an overview of HIPAA security compliance, explores how companies can mitigate their security risks and adapt a strong HIPAA compliant posture using F5 products, illustrates how F5 products map to specific HIPAA security rules, and explores some of the key reasons F5 products are unique in their ability to provide companies with a simple means to allow compliance with HIPAA.

Myths of Bandwidth Optimization | F5 White Paper | Overview

This white paper is intended to shed light on the issues affecting application performance in the wide area, and to give IT managers the knowledge required to design strategic enterprise application acceleration and deployment solutions.

SSL VPN for Secure Wireless LAN Access | Overview

If you are currently using an SSL VPN solution for remote access, you already have a robust wireless access solution in place. This White Paper describes the benefits of using an existing SSL VPN solution for secure wireless LAN access.

SQL Injection Evasion Detection | Overview

The detection of SQL injection attacks has primarily been accomplished through pattern matching techniques against signatures and keywords known to be malicious. Until recently, this technique has been successful. Now attackers are hiding their malicious intent in a variety of ways to escape detection. This White Paper discusses SQL Injection attacks, and how BIG-IP Application Security Manager technology can help prevent them.

XSS Evasion-Trying to hide in the all-concealing torchlight | Overview

Any site that stores data is at risk for exploitation. However, these interactive sites are a healthy breeding ground for attacks that attempt to use the data storage capabilities to reach a wide audience for the purpose of spreading malicious code and enticing users to share sensitive information. This White Paper discusses XSS attacks, and how BIG-IP Application Security Manager technology can help prevent them.

Passive Monitoring - Maintaining Performance and Health | Overview

Health monitoring, or the ability to verify that back-end systems are operational, is a basic tenant of load balancing and therefore critical to Application Delivery Controllers. This White Paper describes passive monitoring, and F5's monitoring solutions.

RTSP: One of the Foundations of Convergence | Overview

Real-Time Streaming Protocol (RTSP) is a foundation for the current convergence of communications. This White Paper discusses RTSP, and the BIG-IP Local Traffic Manager (LTM) RTSP proxy service.

Building the Next Generation Network Bridge: From Today's Network to the Future | Overview

The modern SP needs tools and technology to help them start deploying NGN services today on their existing networks with a mindful-eye toward tomorrow. This White Paper describes how F5 Networks provides these tools and technologies and is already a major contributor to many existing SP networks providing cutting-edge technology.

Introduction to the IP Multimedia Subsystem (IMS) | Overview

This White Paper is written to achieve two main goals: to explain the basic vision/need for the IMS architecture and to give the reader a high-level understanding of how it works. In the end, the overarching goal is to help educate the reader on this burgeoning and powerful technology change.

SIP High Availability and Reliability Paradigm | Overview

This paper defines high availability and reliability in SIP-based services and discusses techniques of designing and building reliable SIP networks.

IMS Ready, and Raring to Go | Overview

By extending the capabilities of the F5 suite of products to include pre-built support of the core IMS needs, F5 is positioned to bring the same ease of design, deployment, and management to IMS that we have in enterprise architectures for more than a decade. This White Paper discusses how F5 provides security, performance, and availability to IP networks.

Session Initiated Protocol (SIP): A Five-Function Protocol | Overview

The key to SIP is that it provides only five functions: user location, user availability, user capabilities, session setup, and session management. This White Paper defines SIP and discusses these five functions.

Security Implications of the Virtualized Datacenter | Overview

The concepts behind application and operation system virtualization are not new concepts, they have been around long before server appliances and desktop PCs were readily available in our daily vocabulary. The recent rate of virtualization adoption however, especially that of software operating system virtualization, has grown exponentially in the past few years. This White Paper describes some of the security implications of the virtual datacenter.

Unified Application Infrastructure Services | Overview

While it is important to understand the numerous benefits F5's BIG-IP application delivery networking products bring to an organization, such as high availability, improving application performance, optimizing infrastructure, and providing unique application security, the goal of this White Paper is to explore a more fundamental business and technical problem plaguing today's organizations and how BIG-IP, specifically version 9.4 and the 8800 platform, solves it.

Enhanced Messaging Security: Slicing Spam & Other Threats At The Network Edge | Overview

The volume and sophistication of attacks that threaten business email networks and systems are growing at exponential rates. This White Paper describes the current types of email threats, why the exponential growth in email volume poses significant challenges for the corporate network infrastructure, and how adding a messaging security layer at the network edge addresses these challenges and significantly strengthens an overall messaging security solution.

Effective Disaster Recovery Planning Using F5 & Double-Take Solutions | Overview

This White Paper addresses the increased performance needs of a disaster recovery plan, and the common barriers to achieving success. It also addresses the performance gains that can be achieved by combining a F5 WANJet application acceleration solution with Double-Take® replication solutions from Double-Take Software.

Rolling Out New SSL VPN Service | Overview

This White Paper shows how several Service Provider drawbacks can be overcome when using F5's FirePass SSL VPN product, and elaborates on FirePass deployment in various service provider networks.

Keeping Up with Multi-Service Applications with the BIG-IP Global Traffic Manager | Overview

This White Paper describes how F5's BIG-IP Global Traffic Manager can solve the challenges of a multi-service application infrastructure to provide maximum availability, reduce infrastructure costs and management overhead, and improve application performance for a superior end-user experience.

Enterprise Remote Access | Overview

This White Paper details how F5's FirePass controller enables enterprises to provide secure, reliable and intuitive remote access to corporate applications and data using standard web browser technology, without the headaches associated with time-consuming client software installation and configuration, or changes to server-side applications.

The Role of the Adaptive Network in Service-Oriented Architectures | Meta Group White Paper | Overview

This Meta Group White Paper describes how new approaches to application delivery - such as service-oriented architectures, peer-to-peer, and grid computing - are radically changing the flow of traffic between points on the network.

Intelligent Compression | Overview

Compression technology can provide dramatic application performance improvements. This White Paper discusses the need for compression, the different approaches to compression available in the market today, and how F5's BIG-IP system provides organizations with a powerful way to optimize their bandwidth intelligently while accelerating the delivery of their applications.

Caching Behavior of Web Browsers | Overview

Eliminating the need for the browser to download content on repeat visits can greatly improve the performance of web applications. There are many factors that impact whether or not content can or will be retrieved from the local browser cache on repeat visits, including the browser settings, the web site, and the user's behavior. This White Paper shows how the BIG-IP WebAccelerator can improve the utilization of the user's cache without needing to change the application.

Multi-Tenancy Security with vCMP | F5 Tech Brief | Overview

As organizations adopt virtualization strategies, they are also addressing multi-tenancy requirements. In the resulting dynamic environment, security is paramount. Both virtualization and multi-tenancy require high-performance hardware, such as F5’s scalable VIPRION chassis. F5’s Virtual Clustered Multiprocessing (vCMP) enables organizations to build dynamic combinations of F5 BIG-IP products in a virtual environment. The power of VIPRION and the intelligence of the BIG-IP system help vCMP provide a unique, high-performance, true virtualization solution that meets the needs of multi-tenancy while providing unparalleled security.

Validating Microsoft Exchange 2010 on Cisco and NetApp FlexPod with the F5 BIG-IP System | Overview

As enterprises around the globe move to increasingly virtualized environments, they can use a Cisco and NetApp FlexPod pre-validated data center design—together with F5 Application Delivery Controllers running on the F5 VIPRION chassis—to provide scalability, security, remote access management, and a superior user experience in their virtualized Microsoft Exchange 2010 deployments.

Integrating the Cloud: Bridges, Brokers, and Gateways | Overview

Organizations are increasingly adopting a hybrid strategy for cloud computing to realize the benefits without compromising on control. Hybrid models require integration at the network, infrastructure, and process layers. This integration can be addressed by three new cloud-focused solution types: bridges, brokers, and gateways.

Intelligent Traffic Management with the F5 BIG-IP Platform | Overview

Communications service providers (CSPs) are struggling with an explosion of data traffic resulting from increased mobile usage, streaming video, resource-intensive over-the-top (OTT) applications, and smart device proliferation. At the same time, CSPs must deploy new network technologies and services to stay competitive and satisfy customers. F5 delivers context-aware solutions that enable CSPs to intelligently manage their data traffic, conserve network resources including VAS platforms, enhance security and policy enforcement, and more quickly deliver profitable new services.

Guarantee Delivery and Reliability of Citrix XenApp and XenDesktop | Overview

Organizations today face the challenges of a dynamically changing workforce. They need to provide solutions that improve productivity and enable mobility—both of devices and deployment environments—without compromising performance, security, or reliability, because all three are critical to successfully executing VDI initiatives. To meet these challenges and satisfy user expectations requires a flexible and integrated service platform that can ensure availability, improve performance, and enforce security for any device, in any environment.

F5 PRO-enabled Monitoring Pack for Microsoft System Center: Automated Provisioning | F5 White Paper | Overview

With the powerful combination of F5 BIG-IP Local Traffic Manager, Microsoft System Center Operations Manager 2012, and the F5 PRO-enabled Monitoring Pack for Microsoft System Center, automated Application Delivery Networking becomes a reality.

Government Executive Need to Know Memo: Cybersecurity | Overview

The latest in arming critical networks against hackers.

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium | Overview

Organizations need an end-to-end web application and database security solution to protect data, customers, and their businesses. The integrated solution from F5 and IBM provides improved protection against SQL injection attacks and correlated reporting for richer contextual information.

Maximizing Data Center Efficiency with F5 BIG-IP AAM | Overview

Corporate networks are overburdened by the number of applications they serve and the increasing bandwidth demands of transferring data, including increasing video content. Organizations can take advantage of intelligent bandwidth management and processing offload to keep network performance in top shape.

An Intelligent Services Framework | Overview

Applications running across networks encounter performance, security, and availability challenges that can cost organizations lost productivity, missed opportunities, and damage to reputations. The F5 intelligent services framework meets these challenges with granular control, scalability, and flexibility.

Things to consider when moving to Exchange 2013 | Convergent Computing White Paper | Overview

Exchange 2013 has been released and the necessary service pack for Exchange 2010 to support a migration to it is due out soon, thus it’s an excellent time to consider what you should be doing when migrating to your new Exchange 2013 environment in order to take advantage of the new features and to offer the best experience to your end users. While you’re at it, you might as well also think about how to make this environment easier for IT to manage and secure.

Network Functions Virtualization—Everything Old Is New Again | Overview

Service providers are looking to use network functions virtualization (NFV) to build dynamic, virtualized networks with application and content awareness so they can deliver new and innovative services to subscribers, who are changing how they use connectivity services. F5 technologies deliver the necessary application-layer intelligence, orchestration, and policy management to enable effective virtualization and service monetization.

Security and Speed | Overview

Security is an intrusive mechanism that is often seen to interfere with normal business operations. Nonetheless, security is essential to the normal operation of the business, and the right security mechanisms and approaches can minimize performance degradation.

Secure Application Delivery | Overview

For IT, SSL security often means information obscurity. But the entire organization can be protected with an end-to-end security solution that offers algorithm diversity and advanced key protection while maintaining application visibility and delivery.

vCenter Orchestrator Automates F5 BIG-IP Platform | Overview

Automate application delivery services, enable data center and cloud provisioning, and reduce deployment time with VMware vCenter Orchestrator’s new plug-in for the F5 BIG-IP platform.

Multi-Tenancy Security with vCMP | Overview

As organizations adopt virtualization strategies, they are also addressing multi-tenancy requirements. In the resulting dynamic environment, security is paramount. Both virtualization and multi-tenancy require high-performance hardware, such as F5’s scalable VIPRION chassis. F5’s Virtual Clustered Multiprocessing (vCMP) enables organizations to build dynamic combinations of F5 BIG-IP products in a virtual environment. The power of VIPRION and the intelligence of the BIG-IP system help vCMP provide a unique, high-performance, true virtualization solution that meets the needs of multi-tenancy while providing unparalleled security.

Rethinking Software-Defined Networks | Overview

F5 and Cisco enable enterprises to build an SDN that reduces application delivery time, operational costs and risk of downtime by “operationalizing” the network.