Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Q/A with ExITeam’s Security Engineer Stanislas Piron - DevCentral's Featured Member for October

Stanislas Piron is a Security Engineer for ExITeam. 16 years ago, Stanislas started out with Firewalls, email and Web content security. His first F5 deployment was with LTM and Link Controller 10 years ago and he is DevCentral’s Featured Member... Read more
Average Rating: 5.0
4 Reviews

DevCentral at Agility 2016 - The Preview Video

Now that I'm part of the DevCentral team, I give a preview of the DevCentral activities for F5's Agility 2016 event, May 17-18, in Vienna Austria. ps Read more
0 Reviews

RSA Security Octagon: What's the Best Way to Secure Applications?

We're doing something a little different this year at #RSA with a Security Octagon. Everyone loves a good debate and in the security community discussions pop up constantly around a myriad of topics at any given point - with individuals or... Read more
0 Reviews

Would You Put Corporate Applications in the Cloud?

There once was a time when organizations wouldn’t consider deploying critical applications in the cloud. It was too much of a business risk from both an access and an attack perspective—and for good reason, since 28 percent of enterprises have... Read more
0 Reviews

Five Ways #IamF5

In 2013, F5 Networks was honored by the City of Seattle when the mayor proclaimed February 5 as F5 Day to recognize the contributions of F5 to our community and we’re celebrating in all of our offices around the globe. Check out Celebrating F5 Da... Read more
0 Reviews

The New, Old Kid in Town

For nearly 12 years at F5, I've had only two job titles - Security Systems Architect from 2004-06 and Technical Marketing Manager since 2006. Whenever anyone asks what I do at F5, I typically answer, 'Writer, speaker and video... Read more
2 Reviews

Backseat Drivers, Your Wish Has Come True

Excuse for speeding 10 years from now: ‘Officer, it was the software.’ When I was in college, I would drive the 1040 miles from Marquette Univ. in Milwaukee to my parent’s house in Rhode Island for things like summer vacation and semester break.... Read more
0 Reviews

Internet of Insider Threats

Identify Yourself, You Thing! Imagine if Ben Grimm, aka The Thing, didn’t have such distinctive characteristics like an orange rocky body, blue eyes or his battle cry, ‘It’s Clobberin’ Time!’ and had to provide a photo ID and password to prove he... Read more
0 Reviews

Meet the Sensors

I often write about the Internet of Things, or the soon-to-be-cliché IoT. You know, the smart-fridges, smart-cars, smart-thermostats, healthcare devices, wearables and any of those connected devices that have a sensor, gathers data and... Read more
0 Reviews

Five Information Security New Year's Resolutions

Shot this late last year for Information Security Buzz. What are five information security new year's resolutions for improving cyber security in 2016 and why? ps Related: New Year's Resolutions for the Security Minded Blueprint... Read more
0 Reviews

Blog Roll 2015

It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2015 blog entries. If you missed any of the 89 attempts including 59 videos, here they are... Read more
0 Reviews

The Top 10, Top 10 Predictions for 2016

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. 7 Future Predictions for... Read more
Average Rating: 3.0
3 Reviews

Ask the Expert – Why Identity and Access Management?

Michael Koyfman, Sr. Global Security Solution Architect, shares the access challenges organizations face when deploying SaaS cloud applications. Syncing data stores to the cloud can be risky so organizations need to utilize their local directorie... Read more
0 Reviews

Ask the Expert – Why Web Fraud Protection?

Corey Marshall, Security Solution Architect, explains why the browser is a new threat vector into an organization’s applications and infrastructure. This universal client can be the weakest link in the access chain and malicious characters ar... Read more
0 Reviews

Ask the Expert – Why SSL Everywhere?

Kevin Stewart, Security Solution Architect, talks about the paradigm shift in the way we think about IT network services, particularly SSL and encryption. Gone are the days where clear text roams freely on the internal network and organization... Read more
0 Reviews

Ask the Expert – Are WAFs Dead?

Brian McHenry, Sr. Security Solution Architect, addresses the notion that Web Application Firewalls are dead and talks about what organizations need to focus on today when protecting their data and applications across a diverse environment. H... Read more
0 Reviews

F5 + Nutanix: Invisible Infrastructure and SDAS Joining Forces

F5 and Nutanix partner to bring the power of invisible infrastructure and software-defined application servers to critical enterprise application. Joint customers benefit from improved availability, scalability, performance, and security enable... Read more
1 Review

F5 + SimpliVity: Deploy and Simplify Application Deployments Together

F5 and SimpliVity partner to improve manageability, strengthen security, and ensure faster and more successful deployments. Joint customers benefit from the integration and interoperability that result from this close collaboration... Read more
1 Review

That’s a Wrap from AWS re:Invent 2015

I wrap it up from AWS re:Invent 2015 from the Venetian Sands. Thanks to you for watching this week and special thanks to our guests, Damir Vrankic, Thomas Stanley, Robert Haynes, Alex Applebaum and Brian Pickering along with Jeanette Geary fo... Read more
1 Review

AWS re:Invent 2015 – The F5 Ready Program (feat Pickering)

Brian Pickering, Regional VP - Cloud Partners, talks about F5 Ready, a program that makes sure that F5 BIG-IP virtual editions are compatible with a growing list of cloud providers via an F5-driven verification process and flexible licensing an... Read more
0 Reviews

AWS re:Invent 2015 – Programmability in the Cloud (feat Applebaum)

Programmability and orchestration are critically important with cloud deployments and Alex Applebaum, Sr. Product Management Engineer, explains why and talks about ways organizations can use BIG-IP programmability in the cloud. Yet anothe... Read more
0 Reviews

AWS re:Invent 2015 – Web Application Firewall in the Cloud (feat Haynes)

WAFs are one an organization’s key line of defenses against web application attacks and Robert Haynes, Marketing Services Architect, shares some of the app security considerations organizations must face when deploying their critical application... Read more
0 Reviews

AWS re:Invent 2015 – SSL Everywhere…Including the Cloud (feat Stanley)

Thomas Stanley, Product Management Engineer, discusses the challenges organizations face when implementing a SSL Everywhere strategy even in the cloud. He gets into areas like SSL certificates, key management, multiple interfaces and the learnin... Read more
1 Review

AWS re:Invent 2015 - Value of App Services in the Cloud (feat Vrankic)

Damir Vrankic, Director – Product Management, explains how critical application services such as availability, security and performance play a critical role, especially when delivering applications from the cloud. He discusses the risks, like dat... Read more
0 Reviews

Find F5 at AWS re:Invent 2015

I show you how to find F5 Booth 830 at AWS re:Invent. AWS re:Invent has grown tremendously over the last 4 years and F5 is here to help organizations ensure that their critical app services follow those applications to the cloud. Get a behind th... Read more
0 Reviews