2015 blog posts

2015 blog posts(59)

To achieve consistent security for hybrid cloud, look to the cloud
F5 Ecosystem | 12/21/2015

To achieve consistent security for hybrid cloud, look to the cloud

As early as 2009, when cloud was just beginning to rise ascendant as the technology most likely to disrupt, well, everything, many of us began looking at the problem of consistency at the infrastructu...

By Lori Mac Vittie
The Internet of (Increasingly Scary) Things
F5 Ecosystem | 12/16/2015

The Internet of (Increasingly Scary) Things

There is a lot of FUD (Fear, Uncertainty, and Doubt) that gets attached to any emerging technology trend, particularly when it involves vast legions of consumers eager to participate. And while it’s e...

By Lori Mac Vittie
F5 SOC: Shutting Down Malicious Scripts in Real Time
F5 Ecosystem | 12/14/2015

F5 SOC: Shutting Down Malicious Scripts in Real Time

It’s only sort of true that people are the weakest link in the information security chain. The truly weakest link is the browser. That’s because the browser is one of those apps that no one really pa...

By Lori Mac Vittie
Go Beyond POLB (Plain Old Load Balancing)
F5 Ecosystem | 12/14/2015

Go Beyond POLB (Plain Old Load Balancing)

Scalability is a critical capability for both business and applications. On the business side, scaling operations is key to enabling the new app economy...

By Lori Mac Vittie
The “S” in HTTPS Doesn’t Stand for SSL
F5 Ecosystem | 12/07/2015

The “S” in HTTPS Doesn’t Stand for SSL

It is natural to assume that when we see a padlock icon in our browsers that the site is using SSL to secure our communications. It’s also apparently a signal to consumers that the site is, in fact, s...

By Lori Mac Vittie
F5 Previews Pre-Configured WAF Solution for Microsoft Azure Security Center
F5 Ecosystem | 12/02/2015

F5 Previews Pre-Configured WAF Solution for Microsoft Azure Security Center

F5 Previews Pre-Configured Web Application Firewall Solution for Azure Security Center

By F5
F5 & VMware delivering more control and better security for any device, anywhere
F5 Ecosystem | 11/24/2015

F5 & VMware delivering more control and better security for any device, anywhere

F5 and VMware are partnering to support you—our customers—by integrating our technologies, products, and services to meet your business needs from the data center to the cloud. We have done so for clo...

By Frank Strobel
Things talking to Things Talking to Apps
F5 Ecosystem | 11/23/2015

Things talking to Things Talking to Apps

Smart leggings.   A portable Gluten sensor.    Wireless speaker in a light bulb. The number of “things” invading the market today is incredible, and every day brings something...

By Lori Mac Vittie
Where F5 Fits in a DevOps World
F5 Ecosystem | 11/16/2015

Where F5 Fits in a DevOps World

I’m often asked after speaking at conferences just what dog F5 has in the race. Of late, that topic is usually DevOps or related to DevOps in some way. The reality is that application-affine services ...

By Lori Mac Vittie
The Attack You Can’t Stop in Your Application
F5 Ecosystem | 11/09/2015

The Attack You Can’t Stop in Your Application

A wide variety of HTTP-based attacks can (and should) be prevented in your application. The OWASP Top 10 is a prime example of attack techniques that are both detectable and preventable from within an...

By Lori Mac Vittie
The Gravitational Pull of Apps is Forking the Network
F5 Ecosystem | 11/02/2015

The Gravitational Pull of Apps is Forking the Network

The network is forking. Bifurcating. Dispersing. You’re welcome to use whatever term you’d like to use to describe the phenomenon of network services relocating from the quiet suburb that is the corpo...

By Lori Mac Vittie
The Power of the Proxy: Bridging the Gap between Dev and Prod
F5 Ecosystem | 10/26/2015

The Power of the Proxy: Bridging the Gap between Dev and Prod

The world of the application developer and the network architect could not be more different except, perhaps, in the way in which they each view the other’s domain. A typical network perspective of an...

By Lori Mac Vittie
F5 Now Available in Microsoft Azure
F5 Ecosystem | 10/21/2015

F5 Now Available in Microsoft Azure

Discussion of F5 application services available for use in Microsoft Azure.

By F5
What We Can Learn about Scale from Virtualization
F5 Ecosystem | 10/19/2015

What We Can Learn about Scale from Virtualization

As virtualization began to take hold there were a variety of metrics proposed for measuring success. Consolidation ratios, admins to virtual machine ratios, time to provision, and percentage of server...

By Lori Mac Vittie
Service Discovery in a Microservices Architecture
NGINX | 10/12/2015

Service Discovery in a Microservices Architecture

Explore the service discovery within a microservices architecture, including client-side and server-side discovery patterns, the service registry, & more.

By Chris Richardson
21 app services you didnt know existed
F5 Ecosystem | 10/05/2015

21 app services you didnt know existed

When I say “app services” or, to use the more common networking-oriented moniker, “L4-7 services”, what do you think of? Wait, let me guess. You thought of: load balancing caching WAN optimization ...

By Lori Mac Vittie
We need to turn our security model inside out
F5 Ecosystem | 09/21/2015

We need to turn our security model inside out

It’s an application world. That’s beginning to sound trite and cliché, but it’s still true. When it comes to security, that means our focus should start with the application and work our way out ...

By Lori Mac Vittie
The Three Key Characteristics of a Modern App Proxy
F5 Ecosystem | 09/14/2015

The Three Key Characteristics of a Modern App Proxy

Keep the hot side hot and the cold side cold. You may recall (if you’re old enough and no, don’t worry, I won’t ask you to raise your hand) a campaign years ago by McDonald’s promoting packaging of so...

By Lori Mac Vittie
ABAC not RBAC: Welcome to the (IoT) World of Contextual Security
F5 Ecosystem | 09/07/2015

ABAC not RBAC: Welcome to the (IoT) World of Contextual Security

There are many more attributes that can be gleaned from a seemingly simple application request than may at first meet the eye. There is, of course, IP address. From which can be determined one’s locat...

By Lori Mac Vittie
Results 1-30 of 59
Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us