Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

IT安全性不能以一種方案「一體適用」

This is adapated from the original post by Matt Miller. 今天的安全局勢具有高度複雜化的傾向,原因大致上可以歸咎於日益複雜化的網路攻擊本質,特別是從管理者的觀點來看。例如,分散式拒絕服務攻擊(DDoS)現在已達到400Gbps速度,目標包括網路和應用層。很顯然的,攻擊者持續進化,開發其他方法來繞過包括防火牆等傳統安全防護。 對於面對應用層DDoS攻擊威脅的企業而言,必須克服的挑戰在於如何區分人類流量與魁儡(bot)流量。 ... Read more
0 Reviews

F5 Firewall Like No Other– Application-Centric Logging

F5 has always been an engineering-driven company. Sometimes this frustrates new sales people as they have to learn new technologies and come around to looking at the F5 way of doing things. So of course we made our firewall different, too. We... Read more
0 Reviews

F5 Agility Summit 2012 - Splunk

I meet with Splunk's Will Hayes, Director of Business Development at F5's Agility Summit. We get a look at some of the newest Splunk reports for F5's BIG-IP solutions including the BIG-IP Data Center Firewall Solution. ps ... Read more
0 Reviews

Persistent Threat Management

#dast #infosec #devops A new operational model for security operations can dramatically reduce risk Examples of devops focuses a lot on provisioning and deployment configuration. Rarely mentioned is security, even though there is likely no... Read more
0 Reviews

Quantifying Reputation Loss From a Breach

#infosec #security Putting a value on reputation is not as hard as you might think… It’s really easy to quantify some of the costs associated with a security breach. Number of customers impacted times the cost of a first class stamp plus the... Read more
0 Reviews

Interop 2012 - Splunk Reports for BIG-IP Data Center Firewall with Danny Luedke

Peter Silva talks with F5 Product Marketing Manager Danny Luedke about the BIG-IP Data Center Firewall and showcases the new Splunk reports for BIG-IP Data Center Firewall Solution. ";" alt="" />Interop 2012 - Splunk... Read more
0 Reviews

Complying with PCI DSS–Part 3: Maintain a Vulnerability Management Program

According to the PCI SSC, there are 12 PCI DSS requirements that satisfy a variety of security goals.  Areas of focus include building and maintaining a secure network, protecting stored cardholder data, maintaining a vulnerability management... Read more
0 Reviews

RSA 2012 Partner Spotlight - FIREMON

I interview Jody Brazil, President & CTO of Firemon during the 2012 RSA Conference. We chat about Firemon, how Firemon and F5 integrate and a bit about firewalls and security management in general. ";"" alt=""... Read more
0 Reviews

Block Attack Vectors, Not Attackers

When an army is configuring defenses, it is not merely the placement of troops and equipment that must be considered, but the likely avenues of attack, directions the attack could develop if it is successful, the terrain around the avenues of... Read more
0 Reviews

RSA 2012 - BIG-IP Data Center Firewall Solution

Peter Silva interviews F5 Security Product Manager Preston Hogue about the BIG-IP Data Center Firewall Solution, BIG-IP's ICSA Certification and some BIG-IP differences vs. traditional firewalls. ";" alt="" />RSA 2012 -... Read more
0 Reviews

Vulnerability Assessment with Application Security

The longer an application remains vulnerable, the more likely it is to be compromised. Protecting web applications is an around-the-clock job. Almost anything that is connected to the Internet is a target these days, and organizations are... Read more
0 Reviews

The Fundamental Problem with Traditional Inbound Protection

#adcfw #RSAC #infosec The focus on bandwidth and traffic continue to distract from the real problems with traditional inbound protections … The past year brought us many stories focusing on successful attacks on organizations for a wide variety... Read more
0 Reviews

The Ascendancy of the Application Layer Threat

#adcfw Normal0falsefalsefalseEN-USX-NONEX-NONEMicrosoftInternetExplorer4/* Style Definitions */table.MsoNormalTable{mso-style-name:"Table... Read more
0 Reviews
0 Reviews

1024 Words: If Neo Were Your CSO …

When nearly half of folks experienced a stateful firewall failure under attack last year[1], maybe more of the same isn’t the right strategy. [1] Arbor Networks, Network Infrastructure Security Report Read more
0 Reviews

F5 Case Study: WhiteHat Security

Founder & CTO of WhiteHat Security, Jeremiah Grossman talks about the F5/WhiteHat partnership, the benefits of the WhiteHat Sentinel & BIG-IP ASM integration, the sophistication level of some of the recent attacks/breaches reported in the... Read more
0 Reviews

Dome9: Closing the (Cloud) Barn Door

Ever hear the saying, “Closing the barn door after the horse has already left?” It’s not a good thing, and Dome9 aims to make sure you close the (cloud) barn door before the horse bolts – not after. An interesting* side-effect of deploying... Read more
0 Reviews

It Is Not What The Market Is Doing, But What You Are.

We spend an obsessive amount of time looking at the market and trying to lean toward accepted technologies. Seriously, when I was in IT management, there were an inordinate number of discussions about the state of market X or Y. While these... Read more
0 Reviews

F5 Friday: If Only the Odds of a Security Breach were the Same as Being Hit by Lightning

#v11 AJAX, JSON and an ever increasing web application spread increase the odds of succumbing to a breach. BIG-IP ASM v11 reduces those odds, making it more likely you’ll win at the security table When we use analogy often enough it becomes... Read more
0 Reviews

Security in the Cloud. Developers, About Face!

There is a theory in traditional military strategy that goes something along the lines of “take land, consolidate your gains, take more land…” von Moltke the Elder found this theory so profound that he suggested a defender could trade land fo... Read more
0 Reviews

Window Coverings and Security

Note: While talking about this post with Lori during a break, it occurred to me that you might be thinking I meant “MS Windows”. Not this time, but that gives me another blog idea… And I’ll sneak in the windows –> Windows simile somewhere, no... Read more
0 Reviews

F5 Friday: Two Heads are Better Than One

Detecting attacks is good, being able to do something about it is better. F5 and Oracle take their collaborative relationship even further into the data center, integrating web application and database firewall solutions to improve protection... Read more
0 Reviews

Challenging the Firewall Data Center Dogma

Do you really need a firewall to secure web and application services? Some organizations would say no based on their experiences while others are sure to quail at the very thought of such an unnatural suggestion. Firewalls are, in most... Read more
0 Reviews

What Developers Should Or Should Not Do.

Recently I was in a conversation where someone seriously suggested that Web Application Acceleration and WAN Optimization should be the job of developers, since they are in the code and creating the network traffic. At first I was taken aback b... Read more
0 Reviews

Get Your Money for Nothing and Your Bots for Free

Cloning. Boomeranging. Trojan clouds. Start up CloudPassage takes aim at emerging attack surfaces but it’s still more about process than it is product.Before we go one paragraph further let’s start out by setting something straight: this is not a... Read more
0 Reviews