白皮书

更好地了解 F5 技术在实际环境中的应用情况及其在行业趋势中的重要影响力。


Why Every Federal Agency Needs An Enterprise Application Strategy And How To Build One

Find out why it's essential for federal agencies to build an enterprise application strategy and how to do it.

Deploying Amazon CloudFront with the Silverline Managed Services Platform

Learn how a global IT customer uses Amazon CloudFront and the F5® Silverline® Managed Services Platform to provide a highly robust and secure web application delivery experience.

5G 成功部署始于云原生基础架构

5G 正在改变服务运营商的数字化形势,为其带来新的用例和收入机会。能够成功过渡到 5G 的服务运营商可以从新的企业应用、工业自动化、物联网 (IoT) 以及游戏和 AR/VR 等消费服务中受益匪浅。

通过 Azure Active Directory 轻松配置对所有应用的安全访问

F5 BIG-IP APM 与 Microsoft Azure AD 可以无缝配合,可联合访问所有应用,甚至是传统和自定义应用

DDoS 架构图和白皮书

安全与网络架构白皮书介绍了如何设计、部署和管理架构,以防止日益复杂的应用层 DDoS 攻击。请参阅我们的架构图,了解如何降低风险。

借助适用于SmartNIC的BIG-IP VE增强针对云/ NFV环境的DDoS保护

分布式拒绝服务(DDoS)攻击作为活跃分子、犯罪分子、业内玩家甚至政府采用的一种蓄意破坏手段,已经变得愈发普遍。随着服务运营商实施 5G 基础架构和企业正在经历数字化转型,预计潜在攻击的规模和目标表面区域将不断扩大。再加上企业转向使用高效且具有成本效益的软件定义架构的趋势,使得如今针对云/NFV 环境的 DDoS 缓解比以往任何时候都更加重要。

Migrating Workloads to VMware Cloud on AWS

When migrating workloads to VMware Cloud on AWS, you might be concerned about losing the valuable application services you’ve come to count on from F5 or worse, you may believe you’ll have to sacrifice all the hours you’ve already put into creating and maintaining applications, services, and configurations across a myriad of physical and virtual devices. F5’s approach to migrating these workloads removes those concerns from the equation.

F5 and Containerization

Organizations constantly struggle between embracing technological changes to open up new business opportunities and protecting the business from new challenges and risks. In this paper, we’ll examine containerization and how the adoption of this technology in F5 products affects IT professionals, architects, and business decision makers.

缓解加密威胁,确保安全加密

全球几乎所有组织都在向数字化转型。这种转型由收集和传输敏感数据(包括用户数据、客户数据、患者数据和企业数据)的需求所驱动。简言之,如今我们生活的周围充斥着各样的数据,因此,保护数据私密与安全至关重要。

Automating F5 Application Services: A Practical Guide

In this paper, we will provide an overview of ways you can automate the deployment, management, and configuration of F5 BIG-IP appliances (both physical and virtual) along with some advice about how to choose the path that’s right for your business.