Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

The Roadblock for Malicious Traffic

As I’m sure you are aware, the business computing environment is evolving. From all of us and the multitude of devices we now carry and interact with, along with the various ways we access information…to all of the applications and the... Read more
1 Review

IT安全性不能以一種方案「一體適用」

This is adapated from the original post by Matt Miller. 今天的安全局勢具有高度複雜化的傾向,原因大致上可以歸咎於日益複雜化的網路攻擊本質,特別是從管理者的觀點來看。例如,分散式拒絕服務攻擊(DDoS)現在已達到400Gbps速度,目標包括網路和應用層。很顯然的,攻擊者持續進化,開發其他方法來繞過包括防火牆等傳統安全防護。 對於面對應用層DDoS攻擊威脅的企業而言,必須克服的挑戰在於如何區分人類流量與魁儡(bot)流量。 ... Read more
0 Reviews

실제 DDoS 스토리들: SSL 커넥션 플러드

Adapted from David Holmes' "True DDoS Stories: SSL Connection Flood" 서버에서의 SSL 터미네이션 어떤 유명기업의 중요 사이트가 매우 심각한 DDoS 공격을 받아 수 주 동안 다운되는 사태가 발생했는데, 아래 그림은 그 기업의 네트워크 레이아웃을 나타낸 것이다. 경쟁업체들과는 다르게 이 기업은 SSL 트래픽이 그대로 데이터센터 내부에까지 도달해,... Read more
0 Reviews

IT security isn’t one size fits all

The security landscape today is highly complex, which can largely be attributed to the increasingly sophisticated nature of cyber attacks, particularly from an execution perspective. For example, DDoS attacks are now reaching speeds of up to... Read more
0 Reviews

APAC market research points to WAF being integrated with application delivery

We entered 2014 on a fillip. Frost & Sullivan had just named us the vendor leading WAF market in Asia Pacific and Japan. The Frost Industry Quotient, put F5 and nine other companies under their analytical magnifying glass, examining our mark... Read more
0 Reviews

Inside Look - BIG-IP Advanced Firewall Manager

If you enjoyed In 5 Minutes or Less: BIG-IP Advanced Firewall Manager, this is a much deeper dive into the BIG-IP AFM solution.  I introduce BIG-IP Advanced Firewall Manager (AFM) and have Josh Mendosa, Product Management Engineer, show a... Read more
0 Reviews

In 5 Minutes or Less: BIG-IP Advanced Firewall Manager

I show you the new BIG-IP Advanced Firewall Manager as part of the BIG-IP v11.3 release in around 5 minutes...or so. LimelightPlayerUtil.initEmbed('limelight_player_355181'); ps Related: SAML Federation with BIG-IP Access Policy Manager:... Read more
0 Reviews

SYN-Flooding Smartphones

Prolexic just released a report saying that for the quarter (Q2/12), application-layer DDoS attacks have declined as a percentage of all DDoS attacks. That’s not necessarily good news – both L4 and L7 attacks are on the rise, but the former are... Read more
0 Reviews

Interop 2012 - Splunk Reports for BIG-IP Data Center Firewall with Danny Luedke

Peter Silva talks with F5 Product Marketing Manager Danny Luedke about the BIG-IP Data Center Firewall and showcases the new Splunk reports for BIG-IP Data Center Firewall Solution. ";" alt="" />Interop 2012 - Splunk... Read more
0 Reviews

True DDoS Stories: SSL Connection Flood

#adcfw I have a particular fascination with DDoS and I collect what I call True DDoS Stories. This isn’t to say that I ignore traditional smash-and-grab penetrations or SQL injection incidents, but there’s something about an actor (or cast of... Read more
0 Reviews

Block Attack Vectors, Not Attackers

When an army is configuring defenses, it is not merely the placement of troops and equipment that must be considered, but the likely avenues of attack, directions the attack could develop if it is successful, the terrain around the avenues of... Read more
0 Reviews

F5 Friday: Goodbye Defense in Depth. Hello Defense in Breadth.

#adcfw #infosec F5 is changing the game on security by unifying it at the application and service delivery layer. Over the past few years we’ve seen firewalls fail repeatedly. We’ve seen business disrupted, security thwarted, and reputations... Read more
0 Reviews

Defending against the Low-Orbit-Ion-Cannon (LOIC)

It’s been a busy week for the security analysts at F5.  The SOPA bill has been getting its technical teeth pulled out by the likes of Dan Kaminsky during congressional hearings  but passions around the social implications of the bill are... Read more
0 Reviews

HashDos – The Post of Doom Explained

#infosec #adcfwMy previous post was a quick analysis of the US-Cert Vulnerability #903934, coined the “Post Of Doom.”  Much of the buzz has been about ASP.NET’s vulnerability to the attack, but that’s more because Microsoft has gone out of... Read more
0 Reviews

The Ascendancy of the Application Layer Threat

#adcfw Normal0falsefalsefalseEN-USX-NONEX-NONEMicrosoftInternetExplorer4/* Style Definitions */table.MsoNormalTable{mso-style-name:"Table... Read more
0 Reviews
0 Reviews

F5 Friday: When Firewalls Fail…

New survey shows firewalls falling to application and network DDoS with alarming frequency… With the increasing frequency of successful DDoS attacks there has come a few studies focusing on organizational security posture – readiness, awareness,... Read more
0 Reviews

1024 Words: If Neo Were Your CSO …

When nearly half of folks experienced a stateful firewall failure under attack last year[1], maybe more of the same isn’t the right strategy. [1] Arbor Networks, Network Infrastructure Security Report Read more
0 Reviews

F5 Friday: Zero-Day Apache Exploit? Zero-Problem

#infosec A recently discovered 0-day Apache exploit is no problem for BIG-IP. Here’s a couple of different options using F5 solutions to secure your site against it. It’s called “Apache Killer” and it’s yet another example of exploiting not a... Read more
0 Reviews

When the Data Center is Under Siege Don’t Forget to Watch Under the Floor

Don’t get so focused on the trebuchets, mangonels and siege towers that you forget about the sappers. We often compare data center security to castles and medieval defenses. If we’re going to do that, we ought to also consider the nature of... Read more
0 Reviews

F5 Friday: Multi-Layer Security for Multi-Layer Attacks

Modern DoS attacks are distributed, diverse and cross the chasm that divides network components from application infrastructure. A unified application delivery platform with multi-layer visibility is the best way to detect and mitigate multi-layer... Read more
0 Reviews

What We Learned from Anonymous: DDoS is now 3DoS

It’s not just that attacks are distributed, but that attacks are also diverse in nature – up and down the stack, at the same time. If Anonymous has taught us anything it’s that the future of information security is in fending off attacks across... Read more
0 Reviews