Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

新行動化混合世界的存取控制

This post is adapted from Jay Kelley's post here.        企業正跨入一個嶄新的世界。許多新的典範和「淘金熱潮」般的新機會出現在眼前,但同時也伴隨著新的挑戰,它們如同閃電般的貫穿企業組織。 ... Read more
0 Reviews

Access Control in the New Mobile, Hybrid World

There is a brave new world dawning for the corporate world. There are many “new norms” – and a gold rush of new opportunities, but also new challenges with which they come – streaking like lightning throughout organizations. The workforce of... Read more
Average Rating: 4.9
3 Reviews

Saudi Cybersecurity Threat Landscape “More Intense and Complex Than Ever”

Leading Saudi IT decision-makers agree that cybersecurity threats are growing in intensity and scale across the Kingdom. The situation is putting businesses at risk of hits to both reputation and bottom line. A new survey commissioned by F5... Read more
0 Reviews

The Digital Dress Code

Coming to an office near you. If you thought the Bring Your Own Device (BYOD) craze was a headache, just wait until button cameras, smart watches, and spy glasses (already here) are a daily occurrence in the office. Workplace #wearables will be a... Read more
0 Reviews

VMworld 2014 Partner Spotlight – BIG-IP & AirWatch Integration (feat AirWatch’s Berenato)

Andrew Berenato, AirWatch Business Development Manager, does a great job explaining the many enterprise mobile device management challenges that the BIG-IP & AirWatch integration solves. BYOD, secure corporate apps, maintain compliance and... Read more
0 Reviews

The First Six Remix

With 2013 cruising along and half the year in the rear view, I thought a rest stop with all the off-ramps thus far would catch you up on this road trip.  67 stops, 44 watchable. BYOD Behavior - Size Does Matter In 5 Minutes or Less - PCoIP... Read more
0 Reviews

This Blog May Have Jumped the Shark

Really?  Already?!? For whatever reason, the phrase 'Jump the Shark' has been jumping out at me recently.  From the Jump the Shark Hat Tutorial to watching past episodes of Supernatural on Netflix to Cloud Computing to the many... Read more
0 Reviews

Inside Look - F5 Mobile App Manager

I meet with WW Security Architect Corey Marshall to get an Inside Look and detailed demo of F5's Mobile App Manager. BYOD 2.0: Moving Beyond MDM.   ps Related: F5's Feeling Alive with Newly Unveiled Mobile App Manager BYOD 2.0 –... Read more
0 Reviews

The Problem with Consumer Cloud Services...

…is that they're consumer #cloud services. While we're all focused heavily on the challenges of managing BYOD in the enterprise, we should not overlook or understate the impact of consumer-grade services within the enterprise. Just as... Read more
0 Reviews

BYOD and the Death of the DMZ

#BYOD #infosec It's context that counts, not corporate connections. BYOD remains a topic of interest as organizations grapple not only technologically with the trend but politically, as well. There are dire warnings that refusing to support... Read more
0 Reviews

VMworld2012: VMware View Single Namespace

I catch up with F5 SE Scott Friedman to whiteboard and discuss F5's Single Namespace solution for VMware View.  Only 1 URL to remember and let BIG-IP make the decisions. ps Read more
0 Reviews

VMworld2012: VMware View Username Persistence

I hang with F5 Systems Engineer Joe Hermes for a cool demo showing the Username Persistence solution, which allows users to continue their VMware View session across devices. Pretty cool stuff, perfect for BYOD and an F5 exclusive. Apologies for... Read more
0 Reviews

Drama in the Cloud: Coming to a Security Theatre Near You

#mobile #infosec #gdi Conflicting messages from various trends are confusing … should you care about the client end-point or not? On the one hand, cloud: "Another key enabling factor for enterprise mobility is the cloud based delivery... Read more
0 Reviews

Cloud Security: It’s All About (Extreme Elastic) Control

#iam #infosec #cloud #mobile Whether controlling access by users or flows of data, control is common theme to securing “the cloud” The proliferation of mobile devices along with the adoption of hybrid cloud architectures that integrate black-box... Read more
0 Reviews

F5 + VMware -ByoD + Cloud = mobiler und sicherer Zugriff auf Unternehmenressourcen

Das diesjährige Thema des VMware Forums trifft den Nagel auf den Kopf. Bring you own Device ist das derzeitige Top-Thema, denn in vielen Gesprächen mit den CIOs dieser Welt hören wir immer wieder, was für eine Herausforderung... Read more
0 Reviews

Interop 2012 - Application Delivery Optimization with F5's Lori MacVittie

I chat with Lori MacVittie about F5’s Application Delivery Optimization (ADO) solutions which accelerate applications across public and private clouds to better support remote and mobile users.  SPDY support is a big conversation... Read more
0 Reviews

Hey You, Get Off-ah My Cloud!

Who would have thought that a Rolling Stones song written almost 50 years ago could become a technology cliché (or battle cry) a half-century later.  Yesterday, research firm Gartner Inc. said that by 2014, The Personal Cloud will... Read more
0 Reviews

RSA 2012 Partner Spotlight- SecureAuth

I interview SecureAuth CTO - Garret Grajek, about the BIG-IP/SecureAuth integration. In a fun, lively and informative interview, Garret gives a great overview of how the partnership helps AAA, SSO and Federated deployments.  Also check out... Read more
0 Reviews

New Year, Fewer Predictions

After a couple of weeks of vacation, some minor oral surgery, a birthday, and my five year anniversary at F5 Networks (has it really been that long?), I’m back to annoy or please you some more. Our holidays were acceptable, and here’s hoping all... Read more
0 Reviews

It Is Not What The Market Is Doing, But What You Are.

We spend an obsessive amount of time looking at the market and trying to lean toward accepted technologies. Seriously, when I was in IT management, there were an inordinate number of discussions about the state of market X or Y. While these... Read more
0 Reviews

A Digital Poltergeist On Your Television

I love starting blogs with, ‘Remember when…’ and this is no different.  Remember when, we used to receive our television programming over the air via an antenna?  Many still do but the days of seeing a huge pointy metal object perched on... Read more
0 Reviews

Controlling Cloud and iPad. Be the Usher, Not the Bouncer

The purpose of an usher, be it at an old time movie theater or a wedding, is to take people to suitable seats and see that they’re comfortable. The purpose of a bouncer is to throw out bums and keep the peace. These two words conjure pictures in... Read more
0 Reviews

CloudFucius Dials Up the Cloud

According to IDC, the worldwide mobile worker population is set to increase from 919.4 million in 2008, accounting for 29% of the worldwide workforce, to 1.19 billion in 2013, accounting for 34.9% of the workforce.  The United States has th... Read more
0 Reviews

CloudFucius Inspects: Hosts in the Cloud

So much has been written about all the systems, infrastructure, applications, content and everything else IT related that’s making it’s way to the cloud yet I haven’t seen much discussion (or maybe I just missed it) about all the client... Read more
0 Reviews

CloudFucius Wonders: Can Cloud, Confidentiality and The Constitution Coexist?

This question has been puzzling a few folks of late, not just CloudFucius.  The Judicial/legal side of the internet seems to have gotten some attention lately even though courts have been trying to make sense and catch up with technology fo... Read more
0 Reviews