Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

HP Discover and what F5 bring to the party

There are only a couple of weeks to go before HP Discover, taking place this year in Frankfurt on 4-6 December.  HP is a big organisation with lots of end user and vendor touchpoints.  The short video below, by F5's Alasdair... Read more
0 Reviews

DNSSEC – the forgotten security asset?

An interesting article from CIO Online last month explained how DNS had been used to identify over 700 instances of a managed service provider’s customers being infected with malware. The MSP was able to determine the malware using DNS. As the... Read more
0 Reviews

Context. SDN. Big Data. Security. Cloud.

That's right, something for everyone.  F5 recently attended IP Expo in the UK.  We had some speaker sessions at the event - some readers might have come along and seen them live.  The event organisers did a nice job of filming... Read more
0 Reviews

"Why Legacy Security Systems are Failing"

As explained by Nathan Pearce during a presentation at the National Security Conference in the UK earlier this year.  Non-technical, real-life, worth taking a few minutes to listen to: Read more
0 Reviews

VMworld 2012 Europe - Strobel's Scribblings, Part IV

The last installment...sniff...from F5's Frank Strobel at VMworld in Barcelona: One man's end is another's beginning... While VMworld EMEA 2012 came to an end today, something else saw its first light: @F5VMW The latest member to the... Read more
0 Reviews

VMworld 2012 Europe - Strobel's Scribblings, Part III

More from Frank Strobel, live from VMworld 2012 in Barcelona.  Today, 16,000 feet and a tale of two booths... At the end of another 10 hour day at VMworld in Barcelona, my feet started hating me.  At least, they clearly express their... Read more
0 Reviews

Of Escalators and Network Traffic

Escalators are an interesting first world phenomenon. While not strictly necessary anywhere, they still turn up all over in most first-world countries. The key to their popularity is, no doubt, the fact that they move traffic much more quickly... Read more
0 Reviews

VMworld 2012 Europe - Strobel's Scribblings, Part I

The first of what will be a series of reports from Barcelona...F5's Frank Strobel wraps-up Day Zero's events: ---------- Normal 0 false false false EN-US X-NONE... Read more
0 Reviews

The Problem with Consumer Cloud Services...

…is that they're consumer #cloud services. While we're all focused heavily on the challenges of managing BYOD in the enterprise, we should not overlook or understate the impact of consumer-grade services within the enterprise. Just as... Read more
0 Reviews

Policy is key for protection in the cloud era

Today, companies host mission-critical systems such as email in the cloud, which contain both customer details, company-confidential information and without which, company operations would grind to a halt. Although cloud providers were forced to... Read more
0 Reviews

Flexibility, Hyper-V and BIG-IP Virtual Edition

Many (most) people don’t want to depend on only one vendor for anything, whether that be security, storage or virtualisation, especially if it’s a critical application, platform or technology. This is one of the reasons that Hyper-V is growing i... Read more
0 Reviews

VMware’s Mobile Secure Desktop Bootcamp…

F5 features heavily on Day 4 of the VMware View Mobile Secure Desktop Bootcamp.  Click through to VMware’s End User Computing Blog here (or see below) for free-on-demand training.  As F5’s Lori MacVittie posts here, “by combining BIG-IP... Read more
0 Reviews

Videos from F5's recent Agility customer / partner conference in London

A week or so ago, F5 in EMEA held our annual customer / partner conference in London.  I meant to do a little write-up sooner but after an incredibly busy conference week I flew to F5's HQ in Seattle and didn't get round to posting... Read more
0 Reviews

Mobile Devices and Securing the Wild.

How do we secure against the threat of #mobile lost devices now and in the future? Security and application accessibility is a chicken and egg question. Of course you develop apps first in an emerging space, but when do you introduce security?... Read more
0 Reviews

Information Age 'How To' Guide to securing the enterprise

From secure remote access tips to technical precautions to defend web app functionality, this guide, published in conjunction with Information Age, has it all. Contributors include several of F5's best security people. Read more
0 Reviews

Data Diversity: a leading UK tech writer posts…

To change things up a little TechView has invited tech luminary Adrian Bridgwater to share a few thoughts on Big Data and related management issues.  More about Adrian can be found at the end of this post.  He can be found in many ... Read more
0 Reviews

Broken Yo Yo!

An emergency. VIPRION blade down. But this wasn’t the worst of it. In Denmark, the F5 expert team at security and networking reseller Snex faced a dire situation. The F5 Yo Yo had broken. The Technical Support team at F5 swung into action... Read more
0 Reviews

Mobile Device Support for VMware View

End user computing means that a wide range of mobile devices from laptops to tablets and from desktops to smartphones are being used. The diversity of these mobile devices and the sheer number of them in the workplace can overwhelm IT and strain... Read more
0 Reviews

“You can use Application Delivery Controllers as firewalls?”

When F5 sent out a global survey to 1000 large organisations worldwide, concentrating on complex attacks and how people defend against them, some of the questions related to what people use to protect their web-facing applications. In one section... Read more
0 Reviews

On the move: connecting users to apps

Whether it be traffic flow, water flow or the flow of commerce, there exist points within these flows where control mechanisms are applied. These control points might be simple - like traffic lights - or complex - like power distribution for a... Read more
0 Reviews

F5 Friday: Join Robin “IT” Hood and Take Back Control of Your Applications

Mobile users. cloud computing . End-runs around IT security by developers. The trend has always existed, it’s just speeding up now. IT needs to take back control – and fast. But first IT needs the tools with which to do that… Let’s ignore the... Read more
0 Reviews

More Users, More Access, More Clients, Less Control

It used to be that “mobile” access implied “remote” access. That’s no longer true. As the variety of clients continue to expand along with the venues from which we users can access corporate resources the ability to intelligently enforce... Read more
0 Reviews

National Politics and Web 2.0 Usage in the Enterprise

No matter what country you live in, if it is in any way democratic, you have seen the political trend wherein nearly everyone knows the correct solution to a given problem, but hidden agendas, partisanship, and general demagoguery get in the way... Read more
0 Reviews

F5 Friday: Never Outsource Control

Extending identity management into the cloud   The focus of several questions I was asked at Interop involved identity management and application access in a cloud computing environment. This makes sense; not all applications that will... Read more
0 Reviews