Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

APAC market research points to WAF being integrated with application delivery

We entered 2014 on a fillip. Frost & Sullivan had just named us the vendor leading WAF market in Asia Pacific and Japan. The Frost Industry Quotient, put F5 and nine other companies under their analytical magnifying glass, examining our mark... Read more
0 Reviews

DNSSEC – the forgotten security asset?

An interesting article from CIO Online last month explained how DNS had been used to identify over 700 instances of a managed service provider’s customers being infected with malware. The MSP was able to determine the malware using DNS. As the... Read more
0 Reviews

Context. SDN. Big Data. Security. Cloud.

That's right, something for everyone.  F5 recently attended IP Expo in the UK.  We had some speaker sessions at the event - some readers might have come along and seen them live.  The event organisers did a nice job of filming... Read more
0 Reviews

"Why Legacy Security Systems are Failing"

As explained by Nathan Pearce during a presentation at the National Security Conference in the UK earlier this year.  Non-technical, real-life, worth taking a few minutes to listen to: Read more
0 Reviews

Videos from F5's recent Agility customer / partner conference in London

A week or so ago, F5 in EMEA held our annual customer / partner conference in London.  I meant to do a little write-up sooner but after an incredibly busy conference week I flew to F5's HQ in Seattle and didn't get round to posting... Read more
0 Reviews

Information Age 'How To' Guide to securing the enterprise

From secure remote access tips to technical precautions to defend web app functionality, this guide, published in conjunction with Information Age, has it all. Contributors include several of F5's best security people. Read more
0 Reviews

Block Attack Vectors, Not Attackers

When an army is configuring defenses, it is not merely the placement of troops and equipment that must be considered, but the likely avenues of attack, directions the attack could develop if it is successful, the terrain around the avenues of... Read more
0 Reviews

F5 Friday: When Firewalls Fail…

New survey shows firewalls falling to application and network DDoS with alarming frequency… With the increasing frequency of successful DDoS attacks there has come a few studies focusing on organizational security posture – readiness, awareness,... Read more
0 Reviews

8 things you can do with an ADC to make your apps secure, fast, and available

An application delivery controller (ADC) essentially acts a reverse proxy. That means that client requests interact with the ADC, and the ADC interacts with web and application servers on the client's behalf. This mediation offers t... Read more
0 Reviews

Why Vulnerabilities Go Unpatched

The good folks at Verizon Business who recently released their 2008 Data Breach Investigations Report sounded almost surprised by the discovery that "Intrusion attempts targeted the application layer more than the operating system and less... Read more
0 Reviews