Ken Arora's blog posts

Distinguished Engineer, Office of the CTO

Blog posts written by Ken Arora(8)

Zero Trust: Three Key Strategic Components of Assume Breach
F5 Ecosystem | 04/13/2023

Zero Trust: Three Key Strategic Components of Assume Breach

Breaches and failures occur. Cybersecurity professionals must embrace the zero trust principle of assume breach to internalize what other professions have long understood.

By Ken Arora
What Hollywood Taught Me about Zero Trust
F5 Ecosystem | 05/05/2022

What Hollywood Taught Me about Zero Trust

If the intergalactic spacecrafts from our favorite sci-fi shows were to incorporate the core beliefs of Zero Trust when securing their critical systems, they would have successfully prevented a substa...

By Ken Arora
Application Edge Integration: A Study in Evolution
F5 Ecosystem | 06/07/2021

Application Edge Integration: A Study in Evolution

The path that application delivery has taken over the last 20 years is a story of convergent evolution. More specifically, this era has seen the development of multiple delivery technologies that—when...

By Ken Arora
Living on the Edge: How we got here
F5 Ecosystem | 03/22/2021

Living on the Edge: How we got here

The first in a series of blogs that looks at application-related technologies whose tide will be coming in during the next few years, especially as we evolve toward a more fully dispersed application ...

By Ken Arora
Strategic Benefits of a Robust Data Architecture
F5 Ecosystem | 01/25/2021

Strategic Benefits of a Robust Data Architecture

The payoffs of a well-constructed data architecture go beyond operational process. The benefits extend into strategic operational efficiencies, deeper business insights, and the ability to reach adjac...

By Ken Arora
Why a Structured Data Design Strategy Matters: An Example
F5 Ecosystem | 10/19/2020

Why a Structured Data Design Strategy Matters: An Example

A thoughtful and deliberate data strategy is fundamental to enabling the quality and cost-effectiveness of the most important business workflows. Further, when the workflows are instrumented to transm...

By Ken Arora
The Foundational Role of Data Architecture (in an analytics-focused world)
F5 Ecosystem | 06/08/2020

The Foundational Role of Data Architecture (in an analytics-focused world)

The first step in a discussion about data architecture is to define what the concept of “data architecture” encompasses. Unsurprisingly, the answer turns out to be nuanced—it is layered and multifacet...

By Ken Arora
The Next Journey for Applications: Extracting Value from a Sea of Data
F5 Ecosystem | 03/30/2020

The Next Journey for Applications: Extracting Value from a Sea of Data

"Data is the new oil" or "Data is the grease of the digital economy." If you're like me, you've probably heard these phrases, or perhaps even the more business school-esque phrase "data exhaust moneti...

By Ken Arora
Results 1-8 of 8
Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us