AUTHORS

Articles by F5 Staff

  • Share to Facebook
  • Share to X
  • Share to Linkedin
  • Share via AddThis
Published: Mar 20, 2023
Learn how multi-cloud networking helps improve security, reduce complexity, and lessen the impact of other multi-cloud challenges.
Published: Jan 5, 2023
Today's enterprise architectures lack the necessary factors of agility, scale, security, and observability, which are key to driving technological change, but these six core capabilities will help businesses manage risk and challenges throughout their digital transformation.
Published: Dec 21, 2022
Tech prediction roundup for 2023, from cloud computing trends to cybersecurity threats.
Published: Oct 6, 2022
On behalf of F5, YouGov surveyed 500 IT decision makers to get a snapshot of priorities as they balance the need to empower people and organizations today. One key takeaway: All the Metaverse’s potential to fuel growth, innovation, and emerging industries is at risk if we don’t make security foundational to its evolution.
Published: Sep 29, 2022
Applications—how they are built, the infrastructures they run on, and the data that fuels them—are ever-evolving, adapting, and changing. As a result, they open a range of potential new vulnerabilities, expand your attack surface, and present new security requirements that your teams need help solving.
Published: Sep 23, 2022
This post outlines how Threat Stack Telemetry enables faster forensic investigations and easier generation of artifacts for auditors.
Published: Aug 11, 2022
Read how the Threat Stack DevSecOps team increased the stability and improved operational efficiency of the Threat Stack Data Platform by leveraging Apache Spark and Amazon EMR.
Published: Jun 27, 2022
F5 announces our 2022 Tech for Good grant recipients—25 NGOs working to build more vibrant communities around the globe.
Published: Jun 6, 2022
Need compliance help? This video explains how supervised machine learning / deep learning for cloud security gives high-efficacy alerts and intrusion detection for compliance audits while avoiding false negatives/positives. No alert fatigue for DevSecOps teams.
Published: May 24, 2022
Christine Puccio looks at market and industry trends that point to the value F5 creates in broadening the ways customers can leverage popular commercial marketplaces to procure, consume, and expand the use of solutions from the company’s growing software and SaaS portfolio.
Published: May 23, 2022
Today, security must fulfill multiple roles: enabler of digital transformation, steward of customer trust, and bulwark of organizational reputation. As an essential element of business success, aligning a company's perception of security as a mindset instead of just a feature represents a cultural change that requires time and effort.
Published: May 16, 2022
The need for multi-cloud and edge deployments stems from the growing digital landscape and accelerating business requirements.
Published: May 11, 2022
To help address security needs amid increasing cyberattacks and global supply chain shortages, F5 has teamed with Amazon Web Services (AWS) to offer High Performance Virtual Editions of BIG-IP SSL Orchestrator deployed on AWS. Catherine Newcomb details why SSLO Orchestrator on AWS may be the best choice for you.
Published: Mar 22, 2022
If you’ve tried to buy a car, washing machine, or laptop in the last six months, you know that the global chip shortage is lengthening lead times for consumer hardware pretty much across the board. And the world of IT (including F5) is unfortunately no exception. However, F5 can help you adapt quickly to related supply chain challenges affecting your business with innovative tools like the F5 Journeys Migration Utility.
Published: Feb 15, 2022
The modern application landscape continues to evolve into a world of multi-cloud, microservices, and APIs coexisting with legacy, data center-based apps. Security practices are far more challenging because of process complications and increased time pressures on app development. Organizations need to simplify their approach, with F5 Distributed Cloud Services poised to help.
Published: Jan 5, 2022
Rather than a one-time lift-and-shift, deploying to the cloud has become another option in the app deployment lifecycle, and applications are evolving to make better use of resources by being “cloud-native.” As organizations are increasingly adopting multiple clouds and mutli-cloud, it’s important to ask what other aspects also need to change in the apps and operations realm.
Published: Dec 17, 2021
What do you do when SD-WAN over the Internet isn’t enough? Move that automation to a physical network and connect it everywhere.
Published: Dec 16, 2021
As December comes to a close, tech pundits dust off their crystal balls and share their predictions for the coming year. For Peter Silva's annual list, he's compiled a collection of what the industry is saying (and anticipating) for 2022.
Published: Dec 14, 2021
Vulnerabilities, exploitations, mitigation, and remediation are always disruptive, and it’s F5’s mission to do what we can to provide expertise and support for customers. Teams across F5 have been actively working on tools and guidance to help already overburdened application and security teams mitigate this significant industry threat.
Published: Dec 9, 2021
As distributed modern apps become more common, so will app to app connections, such as hybrid cloud, cloud to cloud, and edge to cloud. Scalable architectures will require a method of dealing with IP overlap that can cleanly be automated.
Published: Nov 29, 2021
Back in the day enterprise architecture was physical and singular, conveniently located in the one place, which could easily be managed and made secure.
Published: Nov 29, 2021
Microservices are the norm in today’s software deployment world. As applications are decomposed into different services, the number of applications that an organization needs to deploy increases. Often the number of services increases hundreds or thousands of times. If I have one hundred applications today, this often becomes thousands of microservices.
Published: Nov 15, 2021
Staying ahead of the growing sophistication of criminal organizations and their attacks is difficult, especially with staffing and resources in short supply. It’s time to look inward and outward. Bringing together cybersecurity and fraud management into an integrated team and leveraging external expertise provides compelling benefits.
Published: Nov 8, 2021
Services like AWS Transit Gateway have significantly simplified cloud networking. F5's Volterra further extends the concept of multi-tiered hub-and-spoke networking to the global level, effectively functioning as a multi-cloud transit gateway to connect public and private clouds.
Published: Oct 26, 2021
How to achieve operational freedom by mixing and matching cloud providers and app services
Published: Oct 7, 2021
Managing and securing workloads is a complex task as enterprises move towards a connected cloud strategy. Find out how F5 is meeting the demand for a new approach to multi-cloud networking.
Published: Aug 15, 2021
Offices across the world are opening up again. But how do we optimize them for hybrid working?
Published: Aug 11, 2021
How Threat Stack's User Interface and alert context changes can reduce key security metrics like mean-time-to-know (MTTK)
Published: Jul 28, 2021
How Threat Stack monitors Amazon EKS and ECS on Fargate to help DevOps, SecOps and other cloud security teams guard against threats like data exfiltration.
Published: Jul 21, 2021
The first in a two-part series around how Threat Stack approaches its UI design for cybersecurity use cases.
Published: Jul 8, 2021
The Microsoft Partner of the Year Awards honor companies that demonstrate excellence in innovation and implementation of customer solutions based on Microsoft technology. This is an especially meaningful award for us because it recognizes F5’s marketplace sales and marketing expertise, as well as consistent, high-quality, predictable delivery to marketplace customers.
Published: Jul 7, 2021
The Dark Night. Lord of the Rings: The Two Towers. Thor: Ragnarök. The Empire Strikes Back—sequels are frequently better than the originals. Sometimes writers need an additional opportunity to build out a fictional world or refine plots and characters. Similarly, in technology it seems the story is never quite over, with solutions like F5’s SSL Orchestrator well positioned to take advantage of industry narrative developments.
Published: Jun 24, 2021
Combining the power of Threat Stack and Squadcast will help you quickly detect and respond to security and compliance risk across your cloud workloads, making an enormous contribution to drive down KPIs such as MTTK and MTTR.
Published: May 19, 2021
As 5G becomes more widespread, an underlying question remains: How will you be able to monetize your investments? Service providers will need modern edge strategies not only to attract different enterprise verticals, but also to deliver on the promise of 5G—increased bandwidth and lower latency close to end users.
Published: May 17, 2021
BIG-IP APM and Azure AD combine to enable seamless, secure access to all applications, regardless of where they’re hosted—in the public cloud, as native cloud or SaaS applications, on-premises, in a data center, or in a private cloud. The integrated solution allows employees to securely access all authorized applications, whether those applications support modern authentication standards and protocols or classic authentication methods, such as Kerberos or header-based methods.
Published: May 11, 2021
It's an all too common scenario where you're not able to login to an e-commerce site without jumping through hoops (forgotten password, reauthentication, email verification—but which email?). This post explores strategies organizations are implementing to spare authentic human users from all this friction, and avoid the associated lost revenue.
Published: May 10, 2021
Cybercriminals targeting the financial services sector are focusing more of their attacks on application programming interfaces (APIs). At the same time, different development teams working on multiple applications often use disparate tool sets, pointing to the increasing importance of industry standards. F5 works closely with financial services customers worldwide to implement and secure the APIs driving open banking.
Published: May 6, 2021
Encryption, while helpful in protecting users’ data privacy, can create serious risks for enterprises if not properly decrypted and inspected for malicious payloads. While no-cost and readily available TLS certificates allow application hosts to cheaply protect their users’ data privacy, bad actors can also hide malware behind a certificate. And it’s becoming increasingly easier for them to do so.
Published: Apr 22, 2021
As enterprises pursue DNS solutions capable of supporting adaptive applications, they look for solutions that match their need for automation, speed, and ability to respond to infrastructure changes in seconds rather than hours. F5 Cloud DNS promotes modern DevOps practices, helping to speed new application rollouts by adding DNS updates seamlessly into surrounding process elements.
Published: Apr 21, 2021
Case studies how cloud-native security + compliance improves ROI: Save time plus increase revenue and productivity
Published: Apr 20, 2021
Every organization wants the same thing from their applications: the best performance for their users and exceptional security to prevent losses and harm. It's a simple concept, but delivering comprehensive security that doesn't slow the speed of innovation isn't easy given the complexities of the modern digital business.
Published: Apr 12, 2021
Digital transformation and the associated data generation are threatening to overwhelm the systems and companies that rely on data to create value. Accordingly, organizations are looking for more efficient, modern computing architectures that can support multi-tenancy and deliver applications at data center scale with all the necessary levels of performance and security.
Published: Apr 8, 2021
In an exciting proof-of-concept (POC) project, F5 partnered with SoftBank Corp. to demonstrate the viability of Multi-access Edge Computing (MEC) in a satellite communications environment, utilizing F5 caching technology to implement MEC and broadcast content in bandwidth-limited communications conditions.
Published: Apr 2, 2021
Mobile networks are becoming increasingly more complex, with multiple generations of networks coexisting alongside security risks that have been inherited from previous implementations. When building out your 5G network, security must be incorporated as part of the planning phase to avoid damaging and costly security missteps.
Published: Mar 24, 2021
We are living in an unprecedented time. Technology innovations routinely disrupt existing business models, and in some cases, completely replace existing industries—continuously and fundamentally changing the way we live and interact with each other. This post identifies three areas where AI is currently having a major impact on the enterprise.
Published: Mar 22, 2021
Ian Jones explores how we’re adapting to the hybrid world of traditional and remote IT professional services.
Published: Mar 19, 2021
The fight for anti-racism in support of our friends, family, and coworkers of Asian and Pacific Islander ancestry is part of a much bigger battle. We are fighting for a world that is radically inclusive—where we, as a global community, don’t just tolerate differences, we celebrate them.
Published: Mar 17, 2021
Keiichiro Nozaki takes a closer look at regional results and variations among the responses received for F5's 2021 State of Application Strategy report.
Published: Mar 9, 2021
IBM Cloud Satellite is designed to bring cloud services to where clients’ data already resides—and help them bridge to where they want to go. This aligns with F5’s ambitions for Edge 2.0 and our vision of distributing applications—at the data center, in the public cloud, and at the edge—to help assure a seamless, consistent, and secure user experience.
Published: Mar 2, 2021
Every organization is now in the digital experiences business—meaning that good UX, high performance, zero downtime, secure transactions, and a high degree of personalization are no longer differentiators; they're expected.
Published: Feb 22, 2021
QUIC has broad industry support and the potential to be the basis of most applications that deliver business value over the internet. Anyone delivering applications over the internet should start thinking about how their operations should change to reflect the new threats and opportunities that these protocols bring.
Published: Feb 12, 2021
According to the Chinese zodiac cycle, the year of the (Metal) Ox has arrived. As the second animal in the zodiac, the stabilizing influence of the Ox points to a calmer atmosphere. Peter Silva gives his thoughts on the months to come and what they might hold for the industry.
Published: Feb 8, 2021
F5’s completion of its acquisition of Volterra marks the beginning of the next phase of edge computing, ushering in the Edge 2.0 era. We envision that in the Edge 2.0 era, digital business in every industry sector will adopt edge computing platforms to deliver applications and to process and analyze data. The edge platform will be an essential component of the user experience for all digital services.
Published: Jan 22, 2021
The pressure is clearly on for organizations to implement the tools and skills needed to thrive in whatever brand of normal lies ahead, creating a range of opportunities for channel partners. Here are some key trends and developments to look out for in 2021.
Published: Jan 15, 2021
During the last year and half, we have been working with a few major global banks to test and evaluate our solutions. To be honest, we were approached by these banks as they started to see the need to create an edge strategy and also start to think about consuming multiple clouds (buzz word – ‘Multi-cloud’), mostly in a private way.
Published: Jan 7, 2021
With Volterra, F5 will transform how customers deliver digital experiences and address the application security and delivery challenges we’re seeing from existing edge technologies. F5+Volterra creates a new paradigm that unifies security and applications across cloud and edge with global consistency.
Published: Dec 14, 2020
As each year comes to a close, tech pundits blow the dust off their crystal balls and share their predictions for the coming year. For Peter Silva's annual list, he's compiled a collection of what the industry is saying (and expecting) for 2021.
Published: Dec 10, 2020
Kubernetes may be free to download and run, but it’s hardly free of cost to own. Like other major open source platforms that are “free” only in a simplistic sense, Kubernetes will almost certainly cost you money to deploy and operate.
Published: Dec 7, 2020
Given DNS is a foundational networking service, it’s not a stretch to claim that digital transformation begins with DNS. Unfortunately, DNS is the last frontier of networking technology modernization. F5 Cloud DNS Service empowers network operations teams and DevOps teams to take advantage of these tectonic shifts in culture (DevOps) and technology (elastic consumption of computing and networking infrastructure).
Published: Dec 3, 2020
Amazon Web Services (AWS) customers can now find and purchase consulting and training services from F5 in AWS Marketplace, a curated digital catalog of software, data, and services that makes it easy to find, test, buy, and deploy software and data products that run on AWS. As a participant in the launch, F5 is one of the first AWS Partners to quote and contract services in AWS Marketplace to help customers implement, support, and manage their software on AWS.
Published: Nov 26, 2020
Kubernetes is an open source platform. You might think, then, that it's a vendor-agnostic platform, meaning that you can easily move from one Kubernetes implementation to another.
Published: Nov 19, 2020
You can barely read a tech blog these days without finding an article that sings the praises of multi-cloud architectures. There are good reasons for that: multi-cloud provides a range of benefits, from cost-savings to increased reliability and beyond.
Published: Nov 19, 2020
The promise of modern apps is the ability to develop, deploy, and deliver applications rapidly, ensuring customers have access to the applications they need whenever they need them. For your teams, this means faster and more frequent deployments by integrating reusable security and networking policies into CI/CD pipelines, freeing developers to focus on creating business value through app development.
Published: Nov 13, 2020
When it comes to 5G and innovation, one's imagination is the only limit. We all know that 5G is largely meant to satisfy the insatiable appetite for lightning-fast speeds and real-time (sub-millisecond) latencies. But it’s also the fundamental basis for enterprise vertical industries and academia enabling the development of some really remarkable technological advances.
Published: Nov 12, 2020
BIG-IP excels at inspecting, analyzing, filtering, and reporting on network traffic, it creates a lot of very useful data. However, parsing and extracting insight from this stream of information can be no small feat. This was one of the primary drivers for the development of the Splunk Add-on for F5 BIG-IP.
Published: Oct 29, 2020
The world of banking is waking up to the potential of open innovation to help solve some of its biggest challenges—making services available to unbanked users or underserved small and medium-sized enterprise (SME) customers. By the end of the decade, it is foreseeable that we may have as many services enabled by our banks as we have apps on our mobile phone.
Published: Oct 29, 2020
Today we are very happy to announce that Volterra is able to serve its customers with PCI DSS Level 1 compliant services. Our entire team has achieved a tremendous amount of work over the past few months to deliver this capability.
Published: Oct 21, 2020
It’s hard to find an enterprise company who hasn’t considered cloud native technologies to help meet user demands or to be more agile. So, what's holding organizations back? Some are wary of the critical parts of the cloud native stack that are open source. Others hesitate upon finding the cloud native market saturated. The choices can be overwhelming—and the downside of making the wrong bet on a soon-to-be-obsolete technology can outweigh the potential upside.
Published: Oct 20, 2020
Many companies have seen years of transformation take place in just the past several months. While adapting to a global crisis has been a catalyst, the long-term requirements have remained the same while the urgency has increased. Organizations want to deliver a superior customer experience. They want business agility, the ability to respond rapidly to changing market conditions. And, ultimately, they want return on their investments.
Published: Oct 1, 2020
National Cybersecurity Awareness Month is happening now. For nearly 20 years, the Cybersecurity and Infrastructure Security Agency (CISA) has devoted every October to telling Americans how to be safer and more secure online. In all that time, has anything changed?
Published: Sep 14, 2020
The central problem with measuring site performance today can be summed up as: "We don't measure the cost of slow. We measure the cost of downtime." Humans tend to work toward what they're measured on. This is not a new concept and, in fact, it's one of the tenets of DevOps and the reason the methodology includes a shift in measurements toward what matters most. Today, that means more than just available—it means fast and reliable too.
Published: Sep 10, 2020
While there are a multitude of fancy new cyber-attacks that can disrupt and harm, it is a distinctly “old school” threat that remains among the most prominent (and disruptive).
Published: Aug 26, 2020
Over the past decade, the quest for faster development cycles, high availability, selective on-demand scaling, and decoupling in general has steered technology-driven organizations to the microservices architecture.
Published: Aug 17, 2020
Despite changes in architectures and location, security problems do not change. Customers still need to protect applications, ensure availability, and defend against DDoS attacks. Application security is just a bigger challenge now due to the expanding attack surfaces and vulnerabilities.
Published: Aug 11, 2020
Agile processes enable rapid releases to deliver customer value quickly and seamlessly; and new technologies make it viable to deliver daily releases, particularly for customers operating on a massive, global scale. Open source provides a model that offers the flexibility, agility, and stability companies need to efficiently deliver applications to their end-users—without the restrictions of vendor lock-in.
Published: Aug 10, 2020
As offices gradually re-open across the world, the question arises of how many of our old working habits we will return to.
Published: Aug 4, 2020
Learn how Threat Stack’s new Fargate support can augment your existing AWS security controls.
Published: May 26, 2020
Today, F5 offers the most comprehensive application services along the code to customer path. For the future, we are doubling down on application telemetries and analytics to help our customers discover insights about their applications, business flows, and user experiences. As we build out our cloud analytics capabilities, we'll further leverage ML/AI to help our customers to improve their business services.
Published: May 26, 2020
With the development of container orchestration technologies, working with containers is easier and more programmatic than ever. But orchestration is only half the battle. Effective container strategies also require solutions for the different elements tied to applications, such as networks, storage, security, traffic management, and DNS.
Published: May 20, 2020
In a get-it-done-now kind of environment, you need a fast and easy way to make sure your web apps are covered by fundamental protections. F5 recognizes the pressures those on the frontlines of the COVID-19 crisis are under, and we don’t want new technology to be another one.
Published: May 19, 2020
Zero Trust is a powerful strategy that can help a business go faster and be more secure. While not a new concept, it is one that has taken on particular relevance for today's application-driven businesses and multi-cloud environments.
Published: May 14, 2020
How many times have you found yourself emailing a sensitive file to your accountant, lawyer, friend, relative, or co-worker and immediately feeling remorseful? Or perhaps you uploaded the file to some cloud storage provider and emailed or Slacked the link.
Published: May 4, 2020
Culture is not something that can be switched on in response to a crisis. Digital transformation, first and foremost, is a response to a business need. So, the initiatives that support it need to be designed with business outcomes in mind. And those business outcomes are informed by organizational culture.
Published: Apr 28, 2020
The expansion of applications tied to organizations’ digital transformation efforts also increases the number of attack surfaces for bad actors to target, with the effects of the current pandemic further accelerating this growth. Coupled with users’ tendency to reuse passwords, you’ve got an unfortunately prime environment for credential stuffing attacks. This article highlights established best practices that can help both businesses and consumers protect themselves.
Published: Apr 23, 2020
In light of digital transformation initiatives quickly becoming a “checkbox” for modern enterprises, effective management of app services—and the devices that power them—is paramount. It’s also not easy, simple, or straightforward, especially in the multi-cloud world. That's why F5 is so dedicated to delivering end-to-end app visibility and control from code to customer with BIG-IQ 7.1.
Published: Mar 30, 2020
A new reality brings new vulnerabilities. With nearly 100% of staff telecommuting, what becomes the most important link in the connectivity chain? When exponentially more customers rely on the Internet to order products, what part of an organization’s operations suddenly becomes the most critical? Of course, it’s the network.
Published: Mar 23, 2020
Spurred by the coronavirus, a mass shift in teleworking has been one of the most notable ways companies like F5 are moving quickly to make sure customers are up and running. But as this shift takes hold industry-wide, complexities emerge in other areas as well. F5 Cloud Services GM Calvin Rowland examines the impact of DNS and how customers are handling related efforts in the current climate.
Published: Mar 20, 2020
Keiichiro Nozaki shares region-specific results of F5's 2020 State of Application Services Report, including perspective on country trends and digital transformation priorities.
Published: Mar 20, 2020
If you’re an IT professional, the impact of COVID-19 presents a host of new business continuity challenges, along with its myriad interpersonal adjustments. You need to respond quickly to unprecedented changes in work schedules, remote access to applications, and spikes in networking and data demands. Any of these can result in sluggish application health and performance due to over-taxed resources—affecting your ability to serve customers as they adapt to new realities.
Published: Feb 25, 2020
In this post, Blaine Connaughton uses Threat Stack’s data portability feature to dive deeper into security analytics using Jupyter PySpark notebooks.
Published: Feb 24, 2020
F5 kicked off the RSA week in brilliance and style at Microsoft Security 20/20. This gala event celebrated and honored their top partners within the Microsoft Security ecosystem. It’s extremely gratifying to be recognized for the customer obsession we have at F5 with the Customer Impact Award, given security is a critical initiative and core competency for both F5 and Microsoft.
Published: Feb 20, 2020
Threat Stack’s latest Threat Intelligence Report and live attack simulation show how Threat Stack Cloud SecOps Program analysts investigate the downstream actions of automation tools when conducting forensics that require user attribution.
Published: Feb 18, 2020
Andrew Warren discusses best practices for writing automated system integration tests using containers in order to effectively gray box test microservices.
Published: Jan 23, 2020
At present, it’s not unusual for DevOps engineers to use cloud-native tools, open source solutions, or other types of inexpensive (or free) resources that don’t require significant investment or interaction with the procurement team. But what if you need to advocate for a richer IT investment to drive needed efficiencies as well as to ensure better security and performance for your apps?
Published: Jan 21, 2020
Threat Stack has introduced additional runtime attack detection to its Cloud Security Platform to further protect web application, microservice, and API workloads against path or directory traversal attacks, and remote code execution.
Published: Jan 15, 2020
Agility is the way of IT these days. We all strive for developers and operations to go faster, to unleash creativity, unhindered by the burdens of provisioning app infrastructure and resources. The trick is balancing our need for app delivery speed with the need to stay secure and compliant.
Published: Jan 10, 2020
Published: Jan 9, 2020
Drawing on lessons learned from its successful 2017 and 2018 Type 2 SOC 2 examinations, Threat Stack further optimized its people, processes, and tools to accommodate scope changes and successfully complete its 2019 Type 2 SOC 2 examination with zero exceptions.
Published: Dec 26, 2019
The use of APIs have the potential to be transformative by enabling new business models and revenue streams. Implemented without adequate guardrails, however, APIs also have the potential to disrupt and put businesses at risk. Concluding his two-part blog series, Mark Campbell outlines steps that organizations can take to help address the industry’s present API security gaps.
Published: Dec 19, 2019
The transformation from monolithic applications to ecosystems of microservices has made APIs a strategic and critical element of business success. APIs are typically designed to be externally exposed and accessed by business partners, customers, and microservices. Just like web applications, though, APIs can be a doorway for unauthorized access to sensitive data. And as with many technology advances, security considerations often trail behind.
Published: Dec 18, 2019
At Volterra, the SRE team’s job is to operate a global SaaS-based edge platform. We have to solve various challenges in managing a large number of application clusters in various states (i.e. online, offline, admin-down, etc.) and we do this by leveraging the Kubernetes ecosystem and tooling with a declarative pull-based model using GitOps.
Published: Dec 12, 2019
Omada Health uses Threat Stack’s Cloud Security, Oversight, and Insight Services to provide data and systems security, and HIPAA compliance.
Published: Dec 11, 2019
A good way to think about how digital transformation and DevOps practices are influencing app deployment is to picture an application factory. Instead of handcrafted policies and manual review processes, network and security experts need to define reusable policies for developers to deploy with their applications as part of an automated deployment pipeline.
Published: Dec 10, 2019
F5's Peter Silva: As each year comes to a close, tech pundits blow the dust off their crystal balls and share their predictions for the coming year. As someone who has (let's generously say) repurposed others' since 2012 rather than thinking up my own, here's what some of the smart folks I read expect to happen...
Published: Dec 5, 2019
The future of security rests on telemetry that is more than technical data points picked out of packets. It requires a holistic view of interactions from client to application to behavior. Machine learning requires enormous amounts of data to establish and recognize patterns. This is why programmable proxies are such a critical part of an advanced security approach.
Published: Dec 4, 2019
For many enterprises, new working patterns need to coexist alongside applications, teams, and technologies that have taken root over time and are now firmly embedded into the fabric of IT delivery. Zach Westall takes a closer look at how F5 and BIG-IP help DevOps teams (and the groups they work with) deploy services throughout the application delivery stack in support of CI/CD practices.
Published: Nov 12, 2019
At NGINX Conf 2019, we conducted more than 50 recorded sessions covering various subjects. This blog shares takeaways from one of the hottest topics in the industry: Site Reliability Engineering (and also the related topic of Chaos Engineering).
Published: Nov 12, 2019
Business Needs a Smarter Mousetrap to Catch Next-Generation Attacks.
Published: Nov 4, 2019
Software as a Service (SaaS) offerings are becoming increasingly prevalent across all industries as organizations look for ever more dynamic and flexible ways to leverage software while ensuring operational stability, cost transparency, dynamic scale and agility.
Published: Oct 31, 2019
TJ Maher examines 10 reasons why his team uses the ThoughtWorks Gauge cross-platform test automation framework to set up acceptance tests at Threat Stack.
Published: Oct 28, 2019
In recent years, enterprises in every industry sector have been embarked on a digital transformation journey in one way or another. Business enterprises are taking advantage of the proliferation of digital technologies to define new business models or to improve business productivity with existing models.
Published: Oct 22, 2019
Published: Oct 17, 2019
F5’s Maggie Miller chats with an industry analyst on the trends driving optimism in the channel, how today’s buyers are different, and advice for F5 partners in this ever-changing market.
Published: Oct 3, 2019
F5 has a cloud-based solution available called the F5 DNS Load Balancer Cloud Service that leverages the AWS SaaS Enablement Framework and is now available in AWS Marketplace. While load balancing has traditionally been handled on-prem quite successfully, Roger Barlow outlines the many advantages of a SaaS-based approach.
Published: Oct 1, 2019
Peter Silva provides a quick introduction to NCSAM 2019, highlighting the theme of “Own IT. Secure IT. Protect IT.”, and also touching on resources F5 provides to help customers better secure applications.
Published: Sep 23, 2019
[Guest blog post] To promote app delivery automation, HashiCorp Terraform enables network operation teams to treat the F5 BIG-IP platform ‘as code,’ so the network infrastructure can be provisioned automatically when new services are deployed. Consul’s central service registry and service discovery capabilities track the real-time network location and health status of all backend services.
Published: Sep 20, 2019
Researchers from the University of Kansas and the Stevens Institute of Technology are focused on developing a new metrics framework for security operation centers (SOCs) that measures and validates SOC performance against enterprise network security. Peter Silva provides more detail on this project and its connection to F5.
Published: Sep 19, 2019
This post shares insights into 10 automated testing tools that Threat Stack uses to make sure that all the functional areas of its platform are being tested effectively and efficiently.
Published: Sep 17, 2019
Through Unity+, F5 is collaborating with our partners to better meet their business needs and serve our mutual customers with flexible licensing models, greater deal registration differentiation and easy-to-consume sales and pre-sales technical learning paths.
Published: Sep 5, 2019
Peter Silva notes some of the ways that the capabilities of our five primary senses are being recreated using sensors. Today, gadgets (and IoT technologies) are being built that work in conjunction with, or completely replace, capabilities of the eyes, ears, nose, tongue, and hands.
Published: Sep 4, 2019
In this post, Tim Buntel explains how Threat Stack’s Application Security Monitoring satisfies the two distinct needs of PCI DSS Requirement 6.6: 1) Reviewing applications to proactively find vulnerabilities (and then make sure they get corrected), and 2) Detecting and blocking attacks in real time.
Published: Jul 18, 2019
Threat Stack’s Application Security Monitoring detects and blocks real-time attacks at runtime while also giving developers the context they need to build in security that can help prevent future attacks.
Published: Jul 16, 2019
Have you ever tried to drive somewhere as fast as you can, but you hit every red light along the way? Murphy’s Law, right? Well, the same thing can happen when you’re deploying your applications—either in your private data center or in a public cloud.
Published: Jul 9, 2019
Threat Stack’s Application Security Monitoring embeds security in development processes with no negative impact on agility or speed of application development and deployment.
Published: Jul 1, 2019
What is Magecart? Magecart is really a term given to a group of cybercrime units. At least a dozen groups are responsible, and each have their own specialty. F5’s Peter Silva examines how it was also last year’s #1 root cause of retail, tech, and manufacturing breaches.
Published: May 29, 2019
F5 SVP Calvin Rowland explains how F5 and Cisco are bringing ACI and BIG-IP closer together.
Published: May 21, 2019
Peter Silva summarizes a recent report on how organizations are moving quickly to adopt the new standard of Transport Layer Security (TLS) 1.3, while addressing both operational and security concerns as a result of the transition.
Published: May 15, 2019
Right now, DevOps is the topic for developers and network experts. The next step in understanding the state of the market was our recent webinar series, Why Application Modernization Matters to Digitalization, in collaboration with experts in this topic. What did they have to say?
Published: May 14, 2019
F5 SVP Calvin Rowland recaps last week’s Red Hat Summit in Boston, highlighting the continued partnership between the two companies that resulted in F5 being honored with a Partner Technology Innovation Award by Red Hat.
Published: May 7, 2019
Employees are often frustrated with corporate security policies and in general, most people’s primary jobs are not security related. F5 Security's Peter Silva discusses why it's important to devise security policies that work for, rather than against employees.
Published: Apr 9, 2019
In recent years, there’s been a volley of sorts about data replacing oil as the world’s most valuable resource. And, as you might imagine, there is far from uniform agreement on the topic.
Published: Mar 27, 2019
Venu Aravamudan, SVP & GM, F5 Cloud Services: F5 Cloud Services accelerate application delivery through a frictionless, intuitive multi-cloud platform. These SaaS solutions are optimized for cloud-native applications and microservices.
Published: Mar 27, 2019
With the launch of F5 Cloud Services, Principal Product Manager Roger Barlow walks you through the specific advantages of the DNS Cloud Service, offering secondary authoritative DNS.
Published: Mar 25, 2019
SVP of Business Development Calvin Rowland shares his excitement around F5’s acquisition of NGINX and looks ahead at the promise of combining technology partner ecosystems with open source efforts to benefit customers and deliver end-to-end application services.
Published: Mar 18, 2019
Keiichiro Nozaki reflects on DevSecCon Singapore 2019 and the evolving roles of DevOps and Security teams, as well as the benefits of collaboration for both.
Published: Feb 8, 2019
When we received and started analyzing the results in The State of Application Services for 2019, we took a close look at some of the items on organizations’ agendas. It shows that while our part of the world has much in common with the rest of the planet, there are some important differences.
Published: Feb 6, 2019
SVP Calvin Rowland digs into a joint solution with Equinix that enables high-speed key retrieval, allowing BIG-IP to decrypt and orchestrate SSL traffic for any application regardless of its location—on-premises, private or public cloud—thereby drastically simplifying multi-cloud key management…and giving you one less thing to worry about.
Published: Feb 5, 2019
The Year of the Pig is upon us! Peter Silva offers his thoughts on the coming year and what it might represent for businesses, security, and the larger industry as 2019 unfolds.
Published: Jan 17, 2019
As a global solution architect at F5, I have the opportunity to look at a lot of access architectures and while many are aspiring, few have achieved their Zero Trust goals.
Published: Jan 2, 2019
Learn about the 3 payloads associated with flatmap-stream and how they can be exploited.
Published: Dec 18, 2018
Ankita Bhalla revisits the importance of understanding the industry’s use of third-party hardware, highlighting F5’s iHealth and new Remote Attestation for TPM Chain of Custody feature as examples of how F5 helps keep you and your applications protected.
Published: Dec 13, 2018
Keiichiro Nozaki, regional marketing architect/evangelist, recently attended the Gartner Symposium/ITxpo 2018 Asia Pacific on the Gold Coast, and asks the question: How many organizations are ready for digital transformation?
Published: Dec 12, 2018
This week sees the release of BIG-IQ 6.1, the latest evolution of F5’s management platform. Dan Schrader walks through the benefits of this new version, focusing on declarative technology for automating the delivery of network services, as well as updated security reporting and dashboards.
Published: Dec 12, 2018
It’s the time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Peter Silva collects his picks of notable prediction lists making the rounds as 2018 comes to a close, along with brief commentary on each.
Published: Dec 7, 2018
Timed to coincide with next week’s KubeCon in Seattle – one of the biggest DevOps-focused conferences of 2018 – we’re highlighting a dozen of our favorite pieces of DevOps-related content from the past year.
Published: Dec 6, 2018
The stability and speed of today’s networks enable application services to act within a scalable system. Instead of a system deployed on a box, application delivery can embrace a modern, stack-based design. It can now be distributed to better take advantage of advances in technology and software, while continuing to benefit from expertise gained in previous years.
Published: Dec 5, 2018
2018 brought us larger breaches, bigger DDoS attacks, and intensifying challenges for organizations to face when defending their infrastructure from criminals. Applications were notably a primary target, and as 2019 rounds the corner, we need to be prepared for the continuous evolution of both cybercrime and security.
Published: Oct 8, 2018
Chief Architect Dave Schmitt and the Office of the CTO reflect on the importance of hardware security expertise in the context of the recent Bloomberg piece on Super Micro. The article also includes questions to ask your vendors to help make sure your systems are protected.
Published: Sep 25, 2018
While the adoption of cloud and containers have disrupted typical network architectures, applications remain tethered to the data for which they are the primary interface. CTO Ryan Kearny explains how a cause-and-effect relationship between apps and data is critical to the future of application delivery, particularly as we find ourselves on the verge of generating more data than we can move.
Published: Sep 17, 2018
Learn how to intercept and modify JavaScript on the fly using Chrome’s devtools protocol.
Published: Aug 30, 2018
During F5’s recent Agility conference in Boston, a group of industry participants from the global service provider community met to discuss and debate topics such as the role of emerging SDN infrastructures, automation, and security.
Published: Jul 25, 2018
A full-proxy for both SSL/TLS and HTTP, SSL Orchestrator can make intelligent decisions to steer inbound and outbound traffic to service chains within the security stack. No other solution can do that.
Published: Jul 25, 2018
What do terms like Identity Perimeter and Zero Trust actually mean for you? Graham Alderson takes a look in the context of F5's new Access Manager.
Published: Jul 9, 2018
F5 rounds out its appliance portfolio with improved price/performance, along with enhanced security and compliance features.
Published: Jul 9, 2018
Back in 2013, we were introduced to the concept of an immutable server. An immutable server is, as the term immutable suggests, static. Its configuration is fixed and cannot (or at least should not) be changed. If changes are required, a new...
Published: Mar 2, 2018
AWS has just announced enhanced F5 managed security capabilities on AWS WAF around Bot Protection, CVE Vulnerabilities, and Web Exploits.
Published: Feb 27, 2018
Changes to the EU’s roaming regulations and raised awareness of security risks are fueling dramatic increases in GPRS Tunneling Protocol (GTP) traffic.
Published: Jan 17, 2018
DX for BFSI industry Summary blog from Analyst Communication in APCJ theater by Kei.
Published: Dec 29, 2017
As December brings 2017 to a close, it also marks an opportunity to be retrospective and look back on the year that was. This past month, we’ve been highlighting some of our blog posts, security research, reports, F5 Labs threat intelligence, and...
Published: Dec 15, 2017
Peter Silva looks into the crystal balls of IT industry pundits and compiles a list of annual predictions for the coming year.
Published: Dec 6, 2017
The BIG-IP Virtual Edition showcased its ability to ensure performance, availability, and security for business-critical applications hosted within the AWS cloud.
Published: Nov 3, 2017
This year we hosted a series of Cloud focused events in the region and were fortunate to be able to connect with a number of customers. In this blog, I would like to summarize where those customers are, in terms of their Cloud shift, and wrap up...
Published: Oct 19, 2017
Published: Sep 14, 2017
Along with their just-opened San Jose data center, Equinix leverages F5 BIG-IP for application services to support multi-cloud interconnection.
Published: Sep 13, 2017
content="The Ansible community requires everyone to be nice to each other, to be empathetic and to be kind. This is best evidenced by the Ansible Code of Conduct for events. One excerpt: “Ansible is dedicated to providing a harassment-free conference..."
Published: Sep 6, 2017
Over the past year, F5 and Ansible have been working hard to bring network automation solutions to our customers. In successive releases, Ansible has introduced more and more network automation functionality, including persistent connections,...
Published: Aug 24, 2017
It’s no secret that security is the leading concern for the majority of public cloud users, but for some organizations and government agencies, it is even more paramount. For these groups, highly stringent regulatory and compliance requirements...
Published: Aug 8, 2017
F5's David Holmes looks back at the recently concluded DC25 and ponders future attendance.
Published: Aug 1, 2017
F5's principal threat research evangelist puts on his reporter hat to bring you some insights from one of the oldest hacker conferences there is.
Published: Jul 20, 2017
SVP Calvin Rowland breaks down what it means for organizations to deploy multi-cloud solutions, touching on DevOps topics as well.
Published: Jun 29, 2017
Nearly one in five of report respondents have security titles. F5's David Holmes takes a closer look at what's important to them.
Published: Jun 22, 2017
F5's Patricia Du discusses service provider topics, including how value-added services improve the customer experience by controlling traffic based on user profiles, network policies, and application characteristics.
Published: Apr 21, 2017
The main theme of this year’s Mobile World Congress (MWC) in Barcelona was the ongoing digital transformation toward a “connected society.” 5G will be instrumental in the adoption of Internet of Things (IoT) technologies such as smart...
Published: Apr 18, 2017
This week, F5 introduced the first and only turnkey solution package that includes advanced application and security services that are engineered, tested, and certified to run with the Red Hat OpenStack Platform.
Published: Apr 12, 2017
Published: Mar 20, 2017
The changing of the software model from shrink-wrap to cloud brought security from an afterthought to the forefront. Here we dive into on three specific areas: confidentiality, integrity and availability.
Published: Mar 8, 2017
F5 Senior Vice President Lizzie Cohen-Laloum explores how achieving balanced executive dynamics and a broader range of strategic perspectives contribute to a robust chain of command.
Published: Feb 22, 2017
Operators are looking for an open, multi-vendor NFV platform to evolve and scale their networks to lower costs, reduce time to market, and improve operational efficiencies.
Published: Feb 16, 2017
As we all know, 4G and LTE are designed to improve capacity, user data-rates, spectrum usage, and latency. 5G represents more than just an evolution of mobile broadband.
Published: Feb 7, 2017
Published: Jan 25, 2017
Published: Jan 20, 2017
Are you as good at presenting as you are at security? Here’s how to most effectively use the limited time you have with your board to explain the risk and the need, and what to do about both.
Published: Jan 20, 2017
The typical app loses more than three-quarters of its initial users within three days of downloading; in a month that figure climbs to 90 percent. Here are nine reasons why.
Published: Jan 4, 2017
With F5’s utility billing, customers can now implement an application delivery infrastructure with no upfront costs.
Published: Dec 16, 2016
The F5 Security Top 16 of 2016 | F5 2016 has been a year to remember when it comes to security (though perhaps also one that many would prefer to forget). Between data breaches, ransomware, hacktivism, zero day vulnerabilities, and DDoS attacks, no one’s information felt as safe as...
Published: Aug 23, 2016
We’re heading back to Las Vegas next week, this time for VMworld, Aug. 28–Sept. 1, at the Mandalay Bay Hotel and Convention Center. VMworld is a great opportunity to better realize the virtual possibilities of F5 and VMware, whether you’re attending the event or following along online.
Published: Aug 16, 2016
Tens of millions of people are out exploring the new world of Pokémon Go. It turns out that many of those users are not people at all, but automated agents, or bots. Game-playing bots are not a new phenomenon, but Pokémon Go offers some new use cases for bots.
Published: Aug 11, 2016
Service providers are experiencing tremendous growth in traffic. They feel pressure to scale their networks to meet demand while maintaining profitable business models. As the networks scale up and out, their operators face...
Published: Jul 6, 2016
With the proliferation of Internet access, and the explosion of online services over the past decade, more people were and continue to routinely share data loosely with more organisations. As apps and websites have mushroomed, control has...
Published: Jul 5, 2016
With fireworks in our rearview mirror, it’s time to turn our focus toward Las Vegas for Cisco Live, July 10-14, at the Mandalay Bay. Whether you’re going to the event or following online, here’s a snapshot of what to expect from F5 at...
Published: Jun 29, 2016
Published: Jun 22, 2016
The developers of the Dridex malware display great proficiency in client and server paradigms as well as obfuscation. The following research outlines this skillset. It, along with Dridex authors’ commitment to the constant and frequent updates in the malware’s features, makes Dridex very agile and consequently hard to detect, decrypt, and analyze.
Published: Jun 21, 2016
Published: May 24, 2016
Published: May 16, 2016
Just how secure are your apps? F5’s Anticipate 2016 event happening in Singapore on 18-19 May at St Regis Hotel will take a close look at this pertinent issue. Security today is primarily centered on protecting the network...
Published: May 9, 2016
Australia is evolving a new way to leverage cloud, and New Zealand is evolving a new efficiency model for government security services. Both countries share one aspect with the rest of the world: challenges around encryption.
Published: May 1, 2016
Perspective from F5's David Holmes, who recently completed a security evangelism tour through Asia-Pacific North (APAC), including his thoughts on the challenges and opportunities in that part of the world.
Published: Apr 19, 2016
During the most recent Mobile World Congress in February 2016, there were a few primary themes that Mobile Network Operators (MNO) and leading-edge vendors (including F5) were discussing. These were the Internet of Things (IoT) and the...
Published: Feb 21, 2016
It’s that time of year again, time for the mobile industry to head to Barcelona to celebrate Mobile World Congress. It’s by far the largest mobile event in the world, and this year’s theme is ‘Mobile Is Everything.’ And for good reason: so much...
Published: Feb 14, 2016
If someone from the 19th century was teleported to witness a mathematics class in action in the year 2016, I would pay to see their astonished looks! From smart board interactions to children fiddling with iPads absorbing all the knowledge the...
Published: Jan 7, 2016
Published: Dec 2, 2015
F5 Previews Pre-Configured Web Application Firewall Solution for Azure Security Center
Published: Nov 16, 2015
Applications sit at the heart of today’s world. They power businesses, serve customers and drive revenue. Emerging technologies open up fresh opportunities but they also bring about new challenges and a lot more complexity. A recent study by F5...
Published: Oct 21, 2015
Discussion of F5 application services available for use in Microsoft Azure.
Published: Oct 20, 2015
Published: Jul 9, 2015
The theme at the recent LTE World Summit in Amsterdam was “Implementing Mobile Infrastructure for Next Generation Communication.” Conference topics focused on the massive growth of devices and skyrocketing data usage on LTE networks, as well as...
Published: Jun 11, 2015
Applications are fundamental to today’s economy. And applications are exploding in sheer numbers, types, and sizes – to meet a large variety of needs. Users of these applications are also increasingly location-independent and mobile, and they have...
Published: Jan 22, 2015
We demonstrate techniques for identifying visits by PhantomJS to help prevent automated attacks.
Published: Jan 21, 2015
Today we introduce and explain an attack tool that is becoming more prevalent among our customers: the Account Checker.