F5-Blog

BLOGS FILTERN NACH:
Lösung
  • Application Security
  • Automation & Orchestration
  • Cloud
  • Traffic Management
  • Service Provider
PRODUKT
  • Security
  • BIG-IP
  • Automation & Orchestration
  • Platforms
Jahr

Constrained Compute: The Case for Hardware Optimization at the Edge

Compute power in not limitless, and if there’s a limit to our ability to increase size and space as we move to the edge, then we must instead focus on optimization. When we have needed to improve capacity in the past, there’s been an introduction of optimized hardware components. Hardware-optimized computes will be a necessary capability for any application-centric platforms looking to support organizational enablement at the edge.

Breaking Down the Barriers to Girls’ Education in Peru

A recipient of an F5 2021 Tech for Good Grant, Sacred Valley Project is purchasing 27 laptops to help indigenous girls in remote areas of Peru apply for university and study for college entrance exams.

How Security Automation Can Mitigate the Risk in Cybersecurity

The banking and financial services industry has been experiencing digital transformation for several years and customer digital expectations combined with COVID-19 are accelerating key initiatives, such as Open Banking and Platform Banking.

Digital as Default: Dealing with Unintended Consequences

As businesses continue to move toward a “digital as default” operating model the ease of operations results in an increase of complexity – task automation requires more code, digital expansion requires more connections, AI-assisted business requires more data. And complexity is the enemy of security. Therefore businesses will have to adapt their security stack to keep up.

Securing GraphQL APIs with F5 Advanced WAF

Over the past several years, many organizations have been going through a digital transformation, a process which has accelerated due to the COVID19 pandemic.

Securing SAP Fiori HTTP Batched Requests (OData) with F5 Advanced WAF

The HTTP protocol is, for the most part, running the web. It is the communications protocol that drives most internet traffic. New ways of network optimizing internet communications are emerging.

Helping New Mothers Stay Connected During the COVID-19 Pandemic

One of 20 recipients of an F5 2021 Tech for Good Grant, Thriving Families is using these funds to help new mothers obtain the mental health support and community connections and resources they need during the COVID-19 pandemic and beyond.

F5 Collaborates With NIST’s National Cybersecurity Center of Excellence (NCCoE) on “Implementing A Zero Trust Architecture Project”

In a simpler time, securing organizational infrastructure was relatively easy: Most if not all applications, services, and resources necessary for a user – usually an employee – to be productive were available on the network.

Hybrid Work is Driving a Shift to Identity-Centric Security

The explosive growth of automation and digitization along with a trend toward hybrid work models will accelerate the momentum away from IP-based security toward identity-based access strategies.