F5 ブログ

The Edge Use Case You’ve Been Waiting For

Let’s say your cat has wandered off. You can’t find them anywhere and tasty treats are not working their magic today. Then imagine that you could leverage the video doorbells in your neighborhood—i.e., idle compute and processing power from endpoints and nodes at the edge—to find them.

Delivering Zero Trust with Microsoft Azure Active Directory’s Conditional Access and BIG-IP APM

BIG-IP APM and Azure AD combine to enable seamless, secure access to all applications, regardless of where they’re hosted—in the public cloud, as native cloud or SaaS applications, on-premises, in a data center, or in a private cloud. The integrated solution allows employees to securely access all authorized applications, whether those applications support modern authentication standards and protocols or classic authentication methods, such as Kerberos or header-based methods.

Infrastructure is still an attractive attack vector

Cloud computing has long sought to remove the need to deal with infrastructure, with APIs and drag-and-drop configuration tools to help keep those adverse to the network and infrastructure from getting their hands dirty. But we can't just ignore it either, or its profile as a key attack target.

F5 VOLTERRAを使ってマルチクラウド環境で、迅速・簡単かつセキュアにネットワークを構築する方法 〜INTEROP TOKYO 2021 BEST OF SHOW AWARD 審査員特別賞の内容を紹介〜

F5ネットワークスは、Interop Tokyo 2021 ShowNetにおいてEdge as a Serviceプラットフォームを実現するVolterraを提供し、マルチクラウド間にセキュアなネットワークを迅速 に構築し、「BEST OF SHOW AWARD 審査員特別賞」を受賞しました。

Buy, Not Bye

It's an all too common scenario where you're not able to login to an e-commerce site without jumping through hoops (forgotten password, reauthentication, email verification—but which email?). This post explores strategies organizations are implementing to spare authentic human users from all this friction, and avoid the associated lost revenue.

Secure the FDX API to Defend Data in Open Banking

Cybercriminals targeting the financial services sector are focusing more of their attacks on application programming interfaces (APIs). At the same time, different development teams working on multiple applications often use disparate tool sets, pointing to the increasing importance of industry standards. F5 works closely with financial services customers worldwide to implement and secure the APIs driving open banking.

F5 Celebrates AAPI Heritage Month

F5 celebrates the contributions that generations of Asian Americans and Pacific Islanders have made to American history, society, and culture.

Increasing Diversity of Location and Users is Driving Business to the Edge

User, within the context of the application domain, has always referred to the entity that interacts with an application. Just as shifts in application architectures drive changes in the technologies that deliver and secure them, shifts in the definition of user have driven changes in where apps are deployed.

State of Application Strategy 2021: Unpacking the Current and Future State of Application Security and Delivery*

You might have noticed a few changes at F5 over the past year. First, we’re just F5 now. Not F5 Networks. Just F5. Because honestly, we’ve never been centered on the network.

F5 Collaborates with NVIDIA to Accelerate and Secure Cloud and Edge Computing

Digital transformation and the associated data generation are threatening to overwhelm the systems and companies that rely on data to create value. Accordingly, organizations are looking for more efficient, modern computing architectures that can support multi-tenancy and deliver applications at data center scale with all the necessary levels of performance and security.

Modernizing our Perspective: Applications versus Experiences

Like Greek and Roman gods, multiple manifestations of the same persona are evident throughout many mythologies. At the core, each incarnation is a new face to an existing persona. A similar reality is true in the digital world; what we call “applications” can often be considered as incarnations of existing functionality.

サイバー攻撃からネットワークを守るための最新情報

モバイル ネットワークは複雑さを増し、複数の世代のネットワークが共存し、さらにこれまでの実装から受け継いだセキュリティ リスクも存在しています。5Gネットワークを構築する際は、有害でコストの大きいセキュリティ上の失策を回避するために、計画の段階でセキュリティを組み込む必要があります。

The Future of the AI-Based Enterprise

We are living in an unprecedented time. Technology innovations routinely disrupt existing business models, and in some cases, completely replace existing industries—continuously and fundamentally changing the way we live and interact with each other. This post identifies three areas where AI is currently having a major impact on the enterprise.

Living on the Edge: How we got here

The first in a series of blogs that looks at application-related technologies whose tide will be coming in during the next few years, especially as we evolve toward a more fully dispersed application delivery fabric and the emergent role of the edge. We’ll begin by examining where we are today (and the paths taken so far).

Fighting for a Radically Inclusive World

The fight for anti-racism in support of our friends, family, and coworkers of Asian and Pacific Islander ancestry is part of a much bigger battle. We are fighting for a world that is radically inclusive—where we, as a global community, don’t just tolerate differences, we celebrate them.

State of Application Strategy 2021: Modernization Mania

This framework maps the technology evolution that accompanies the business journey from physical to digital models. Each phase is marked by a business initiative that is enabled by technology.

State of Application Strategy: Asia Pacific’s Appetite for Edge Computing and App Modernization

Keiichiro Nozaki takes a closer look at regional results and variations among the responses received for F5's 2021 State of Application Strategy report.

Investing in the Next Generation of Black Leaders

Education is the key to changing a life trajectory—and F5 is thrilled to support Rainier Scholars as it prepares students of color for long-term academic success and lives of leadership.

BIG-IP/BIG-IQにおける4つの"Critical"レベルの脆弱性について

2021年3月10日に公表されました脆弱性の内、4つのBIG-IP/BIG-IQの"Critical"レベルの脆弱性に関しまして、その概要をご報告いたします。