Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Entries for February 2011

The claim a company is not a “true security company” because they don’t focus solely on security products is a red herring. If I ask you to define a true security company, you might tend to fall back on the most obvious answer, “Well, it’s a company that focuses on security.”And then I would ask, “Security of what?” And then you might answer, “Well, of whatever it is the product secures, of course.” Of course. What it boils down to is that the most common definition of a “security company” is o...
Because ‘big data’ isn’t just a problem for data at rest, it’s a problem for data being transferred. Remember when we talked about operational risk comprising more than security? One of the three core components of operational risk is availability which is defined differently based not only the vertical industry you serve but also on the business goals of the application. This includes disaster recovery goals, among which off-site backups are often used as a means to address the availability of...
One of the majors Lori and I’s oldest son is pursuing is in philosophy. I’ve never been a huge fan of philosophy, but as he and Lori talked, I decided to find out more, and picked up one of The Great Courses on The Philosophy of Science to try and understand where philosophy split off from hard sciences and became irrelevant or an impediment. I wasn’t disappointed, for at some point in the fifties, a philosopher posed the “If you’re a chicken, you assume when the farmer comes that he will bring ...
I had a great time in San Francisco last week seeing and interviewing many of our security partners.  Special thanks goes out to Jerry Skurla and Kara Hutchins of NitroSecurity, Chris Poulin with Q1 Labs, Jeremiah Grossman of WhiteHat Security, F5’s Andy Oehler, Benny Czarny and Steven Ginn from OPSWAT and Steve Dispensa of PhoneFactor.  We covered a whole range of topics including token less multi-factor authentication, USB key checkers, BIG-IP Edge Client on iPad, WASC, XSS att...
articleirulesdeveventsnewstechtip February 23, 2011 by Joe Pruitt
In previous articles, we have explored using the Google Chart APIs to integrate static charts and graphs with iControl and iRules to build monitoring applications. Creating An iControl PowerShell Monitoring Dashboard with Google Charts Scatter Plotting Response Times With iRules and Google Charts Fun with Hash Performance and Google Charts Monitor Your iRules Performance with iControl and Google-O-Meter Comparing iRule Control Statements Referral Tracking with iRu...
articletechtip February 23, 2011 by Michael
   T he F5 ARX has many command line options and is very configurable. However there are times we need to get a little fancy and automate some tasks or get something done that is creative. For example we have about 8gb for the partition that holds reports. For 90% of our customers this is fine, however we have a few customer who would like to save those reports off automatically to save space. This tip is going to walk you through how to install an “Expect script” to help y...
A: They’re both more what you’d call “guidelines” than actual rules.   An almost irrefutable fact of application design today is the need for a database, or at a minimum a data store – i.e. a place to store the data generated and manipulated by the application. A second reality is that despite the existence of database access “standards”, no two database solutions support exactly the same syntax and protocols. Connectivity standards like JDBC and ODBC exist, yes, but like SQL they are vari...
In nature, things seek a balance that is sustainable. In the case of rivers, if there is too much pressure from water flowing, they either flood or open streams to let off the pressure. Both are technically examples of erosion, but we’re not here to discuss that particular natural process, we’re here to consider the case of a stream off a river when there is something changing the natural balance. Since I grew up around a couple of man-made lakes – some dug, some created when the mighty AuSable ...
Recognizing the relationship between and subsequently addressing the three core operational risks in the data center will result in a stronger operational posture. Risk is not a synonym for lack of security. Neither is managing risk a euphemism for information security. Risk – especially operational risk – compromises a lot more than just security.  In operational terms, the chance of loss is not just about data/information, but of availability. Of performance. Of cu...
Detecting attacks is good, being able to do something about it is better. F5 and Oracle take their collaborative relationship even further into the data center, integrating web application and database firewall solutions to improve protection against web and database-focused attacks. It is often the case that organizations heavily invested in security solutions designed to protect critical application infrastructure, such as the database, are unwilling to replace those solutions in favor of yet...
Page 1 of 5First   Previous   [1]  2  3  4  5  Next   Last