F5 ブログ

Breaking Down the Barriers to Girls’ Education in Peru

A recipient of an F5 2021 Tech for Good Grant, Sacred Valley Project is purchasing 27 laptops to help indigenous girls in remote areas of Peru apply for university and study for college entrance exams.

Digital as Default: Dealing with Unintended Consequences

As businesses continue to move toward a “digital as default” operating model the ease of operations results in an increase of complexity – task automation requires more code, digital expansion requires more connections, AI-assisted business requires more data. And complexity is the enemy of security. Therefore businesses will have to adapt their security stack to keep up.

How Security Automation Can Mitigate the Risk in Cybersecurity

The banking and financial services industry has been experiencing digital transformation for several years and customer digital expectations combined with COVID-19 are accelerating key initiatives, such as Open Banking and Platform Banking.

Securing GraphQL APIs with F5 Advanced WAF

Over the past several years, many organizations have been going through a digital transformation, a process which has accelerated due to the COVID19 pandemic.

Securing SAP Fiori HTTP Batched Requests (OData) with F5 Advanced WAF

The HTTP protocol is, for the most part, running the web. It is the communications protocol that drives most internet traffic. New ways of network optimizing internet communications are emerging.

Helping New Mothers Stay Connected During the COVID-19 Pandemic

One of 20 recipients of an F5 2021 Tech for Good Grant, Thriving Families is using these funds to help new mothers obtain the mental health support and community connections and resources they need during the COVID-19 pandemic and beyond.

Hybrid Work is Driving a Shift to Identity-Centric Security

The explosive growth of automation and digitization along with a trend toward hybrid work models will accelerate the momentum away from IP-based security toward identity-based access strategies.

Edge・クラウド動向から紐解く、F5のVolterra社買収の経緯と戦略とは

今年1月にEdgeクラウド基盤を提供するVolterra社をF5は買収しました。その後、社内外の様々な手続きを経て、先日日本でも報道機関向けの戦略説明会を開催致しました。当ブログでは、各種メディア様の記事をご紹介しながらその内容を総括したいと思います。

F5 Labs Partners with Cyentia Institute for Meta-Analysis of App Security

F5 Labs recently collaborated with the Cyentia Institute, leaders in security data science, to publish a meta-analysis of several prominent industry reports, each of which covers the state of application security, hence the name, ‘the state of the state of.’ This blog from Sander Vinberg comments on the degree of consensus and clarity within the world of application security researchers.

NGINX Plus Authorized by U.S. Department of Defense’s Iron Bank

It was recently confirmed by the U.S. Department of Defense (DoD) that NGINX Plus has received formal authorization from the DoD’s Enterprise DevSecOps Initiative, Iron Bank. This gives DoD teams expanded capabilities as part of a verified digital infrastructure, while also signaling the company’s growing presence in the Federal sector.

CX is just the tip of the DX iceberg

F5 Named Microsoft 2021 Commercial Marketplace Partner of the Year

The Microsoft Partner of the Year Awards honor companies that demonstrate excellence in innovation and implementation of customer solutions based on Microsoft technology. This is an especially meaningful award for us because it recognizes F5’s marketplace sales and marketing expertise, as well as consistent, high-quality, predictable delivery to marketplace customers.

HTTP: The Sequel

The Dark Night. Lord of the Rings: The Two Towers. Thor: Ragnarök. The Empire Strikes Back—sequels are frequently better than the originals. Sometimes writers need an additional opportunity to build out a fictional world or refine plots and characters. Similarly, in technology it seems the story is never quite over, with solutions like F5’s SSL Orchestrator well positioned to take advantage of industry narrative developments.

Adaptive Applications and Event-Driven Infrastructure as Code

Most organizations employ automation with infrastructure as code but still retain control over deployments. Looking forward, we’ll see more of an event-driven approach, where the trigger itself is automated based on an event. This is a significant part of what will make applications adaptive in the future—the ability to react to automatically to events and adapt location, security, and capacity to meet service-level objectives.

Using Tech for Social Good

While technology can help nonprofits extend their social impact, the social services sector spends far less on digital tools than for-profit corporations. To help bridge the gap, F5 recently awarded 20 Tech for Good Grants to nonprofits working to accelerate their digital transformation.

A Day in the Life: Visualizing App Service Performance and Security for AppDev and DevOps

AppDev teams, like their NetOps and SecOps counterparts, start and end their day with a primary goal: ensuring that applications remain healthy, secure, available, and performing well. It’s not so easy, though, to always have visibility into app service performance.

The role of cloud in edge-native applications

It should be no surprise that just as the emergence of cloud gave us cloud-native applications, edge is driving a set of edge-native applications. These applications, however, will not reside solely at the edge. Simultaneously, new architectural patterns are emerging that take advantage of applications residing in the cloud and data center.

Application Edge Integration: A Study in Evolution

The path that application delivery has taken over the last 20 years is a story of convergent evolution. More specifically, this era has seen the development of multiple delivery technologies that—when looked upon in hindsight—have revealed themselves to be the initial, nascent evolutionary steps towards what is becoming the application edge.