Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Plugging Data Leaks

Whether intentional or accidental, data leaks are a huge concern for organizations. And it has been for years. Going back to a 2004 survey from an IT security forum hosted by Qualys, found that 67% of security executives do not have controls in... Read more
0 Reviews

Internet of Insider Threats

Identify Yourself, You Thing! Imagine if Ben Grimm, aka The Thing, didn’t have such distinctive characteristics like an orange rocky body, blue eyes or his battle cry, ‘It’s Clobberin’ Time!’ and had to provide a photo ID and password to prove he... Read more
0 Reviews

Big-IP Access Policy Manager (APM) Identity Federation SAML Documentation

Want to address problems associated with identity federation deployment for SaaS and on-premise applications? Check out How F5 Access Policy Manager solution can help you achieve that here. Read more
0 Reviews

Meet the Sensors

I often write about the Internet of Things, or the soon-to-be-cliché IoT. You know, the smart-fridges, smart-cars, smart-thermostats, healthcare devices, wearables and any of those connected devices that have a sensor, gathers data and... Read more
0 Reviews

Five Information Security New Year's Resolutions

Shot this late last year for Information Security Buzz. What are five information security new year's resolutions for improving cyber security in 2016 and why? ps Related: New Year's Resolutions for the Security Minded Blueprint... Read more
0 Reviews

You Are the Device in 2016

… and the controller and data generator. Were you surprised with that new car in your driveway sporting a huge bow this holiday season? Yea, me neither. But we did get a new gaming console that doesn’t require you to hold a controller in your... Read more
1 Review

F5 Access Policy Manager and Firefox Browser version 43 and 47+

Upcoming Engineering Hotfixes for BIG-IP Access Policy Manager to address interruptions brought by new plug-in signing requirements in Firefox Browser versions 43 and 44 Read more
Average Rating: 4.2
3 Reviews

Managing Horizon Traffic across Multiple Data Centers with BIG-IP DNS

VMware Horizon virtual desktop clients typically use a fully qualified domain name (FQDN) when accessing desktop and application resources. More and more customers are distributing their Horizon application and desktop infrastucture to distribute... Read more
Average Rating: 4.9
4 Reviews

Implementing PCoIP Proxy as a Security Server or Access Point Alternative

VMware’s Horizon Security Server and Access Point provides secure access to sessions over an unsecured WAN and/or Internet connection. Typically, the Security Server/Access Point is placed within an organization’s DMZ. F5 BIG-IP Access Policy... Read more
Average Rating: 4.9
5 Reviews

F5 Access for Chrome OS Now Available

F5 recently released the F5 Access for Chrome OS version 1.0.0 application on the Chrome Web Store. This release of the F5 Access for Chrome OS app empowers customers to enable access from users’ Chromebooks to enterprise applications via F5 BIG-IP Access Policy Manager’s (APM) VPN capabilities. Read more
0 Reviews

BIG-IP APM: Max Sessions Per User – Enable users to terminate a specified session

Technical Challenge Recently I was speaking with a customer and they mentioned that they leveraged the “Max Sessions Per User” setting within BIG-IP APM Access Profile to limit the number of concurrent connections that a single user could have... Read more
Average Rating: 4.9
5 Reviews

Addressing Security Loopholes of Third-Party Browser Plug-ins - UPDATED FEBRUARY 2017

Updated January 2017 - Third-party browser plug-ins such as Java and Flash, as well as certain third-party malicious plugins, have been successful targets of browser-based security attacks and vulnerabilities. Browser vendors are eager to close loopholes allowing control of page content and computer operation outside of browser context. To mitigate these concerns, F5 will soon end the use of browser plug-ins. Read more
1 Review

Windows 10 Support (including F5 BIG-IP Edge Client) Available With Certain BIG-IP APM Versions

This post includes the latest information available from F5 regarding Microsoft Windows 10 support (including F5 BIG-IP Edge Client) with certain BIG-IP APM versions. Read more
0 Reviews

Blog Roll 2015

It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2015 blog entries. If you missed any of the 89 attempts including 59 videos, here they are... Read more
0 Reviews

The Top 10, Top 10 Predictions for 2016

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. 7 Future Predictions for... Read more
Average Rating: 3.8
3 Reviews

Arguing with Things

As more things get connected, we may find ourselves disagreeing with them. We all argue, especially if you’re passionate about something. Sometimes it’s with our spouse, sometimes with friends or co-workers and sometimes we scold objects that... Read more
2 Reviews

F5 BIG-IP Edge Client for iOS version 2.0.6 Released

F5 released its BIG-IP Edge Client for iOS, version 2.0.6 on Apple iTunes on November 17, 2015. BIG-IP Edge Client for iOS, version 2.0.6 includes minor feature updates and addresses issues associated with Apple iOS 9. Read more
0 Reviews

Latest Version of F5 BIG-IP Edge Client for Android Released

F5 released the latest version of the F5 BIG-IP Edge Client for Android, version 2.0.8, on November 18, 2015. This version of the BIG-IP Edge Client for Android adds several features, and addresses challenges found with Android 6.0 (Marshmallow). Read more
0 Reviews

Identity Theft: Not So Scary Anymore?

This article originally appeared on F5.com on 10.20.15. With Halloween in our rearview mirror and the holiday shopping season upon us, a couple surveys are out examining our fears and in particular, our concerns about identity theft. Apparently,... Read more
0 Reviews

Configure Toopher 2 Factor Authentication to work with APM

Toopher is a 2 Factor Authentication provider (https://www.toopher.com/) that can be configured to work with the F5 Access Policy Manager for authenticating users.  Please visit the Toopher website to find out more information about all the... Read more
Average Rating: 4.9
4 Reviews