Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

IT安全性不能以一種方案「一體適用」

This is adapated from the original post by Matt Miller. 今天的安全局勢具有高度複雜化的傾向,原因大致上可以歸咎於日益複雜化的網路攻擊本質,特別是從管理者的觀點來看。例如,分散式拒絕服務攻擊(DDoS)現在已達到400Gbps速度,目標包括網路和應用層。很顯然的,攻擊者持續進化,開發其他方法來繞過包括防火牆等傳統安全防護。 對於面對應用層DDoS攻擊威脅的企業而言,必須克服的挑戰在於如何區分人類流量與魁儡(bot)流量。 ... Read more
0 Reviews

Mitigating Unwanted Communication On Your Service Network

With so many new and varied devices such as smartphones, smartwatches, laptops, and tablets accessing a service provider network, with a 2.9 device per-person average worldwide according to a Sophos survey, it’s no wonder there is Operator... Read more
0 Reviews

Inside Look - BIG-IP Advanced Firewall Manager

If you enjoyed In 5 Minutes or Less: BIG-IP Advanced Firewall Manager, this is a much deeper dive into the BIG-IP AFM solution.  I introduce BIG-IP Advanced Firewall Manager (AFM) and have Josh Mendosa, Product Management Engineer, show a... Read more
0 Reviews

In 5 Minutes or Less: BIG-IP Advanced Firewall Manager

I show you the new BIG-IP Advanced Firewall Manager as part of the BIG-IP v11.3 release in around 5 minutes...or so. LimelightPlayerUtil.initEmbed('limelight_player_355181'); ps Related: SAML Federation with BIG-IP Access Policy Manager:... Read more
0 Reviews

Interop 2012 - F5 in the Interop NOC Statistics

I meet with F5's Professional Services Consultant Sam Richman to review some of the stats from the World’s Largest Portable Network.  Highlights  included:  BIG-IP Data Center Firewall pushed a Terabyte of data; BIG-IP Web... Read more
0 Reviews

F5 Friday: Goodbye Defense in Depth. Hello Defense in Breadth.

#adcfw #infosec F5 is changing the game on security by unifying it at the application and service delivery layer. Over the past few years we’ve seen firewalls fail repeatedly. We’ve seen business disrupted, security thwarted, and reputations... Read more
0 Reviews

The Fundamental Problem with Traditional Inbound Protection

#adcfw #RSAC #infosec The focus on bandwidth and traffic continue to distract from the real problems with traditional inbound protections … The past year brought us many stories focusing on successful attacks on organizations for a wide variety... Read more
0 Reviews

The Ascendancy of the Application Layer Threat

#adcfw Normal0falsefalsefalseEN-USX-NONEX-NONEMicrosoftInternetExplorer4/* Style Definitions */table.MsoNormalTable{mso-style-name:"Table... Read more
0 Reviews
0 Reviews

Challenging the Firewall Data Center Dogma

Do you really need a firewall to secure web and application services? Some organizations would say no based on their experiences while others are sure to quail at the very thought of such an unnatural suggestion. Firewalls are, in most... Read more
0 Reviews

What Developers Should Or Should Not Do.

Recently I was in a conversation where someone seriously suggested that Web Application Acceleration and WAN Optimization should be the job of developers, since they are in the code and creating the network traffic. At first I was taken aback b... Read more
0 Reviews

Congratulations! You do no nothing faster than anyone else!

If you’re going to test performance of anything make sure it’s actually doing what it’s designed to do. Race cars go really fast too – but they don’t get you anywhere but around and around in a big circle. Speed is important, especially in... Read more
0 Reviews

Web Application Security at the Edge is More Efficient Than In the Application

If one of the drivers for moving to cloud-based applications is reducing costs, you should think twice about the placement of application security solutions. There’s almost no way to avoid an argument on this subject so I won’t tiptoe around it:... Read more
1 Review

The Web 2.0 Botnet: Twisting Twitter and Automated Collaboration

Collaborating automatically via Web 2.0 APIs is a beautiful thing. I can update status on Twitter and it will automagically propagate to any number of social networking sites: Facebook. FriendFeed. MySpace. LinkedIn. If I had to do it all... Read more
0 Reviews

Would you risk $31,000 for milliseconds of application response time?

Keep in mind that the time it takes a human being to blink is an average of 300 – 400 milliseconds. I just got back from Houston where I helped present on F5’s integration with web application security vendor White Hat, a.k.a. virtual patching.... Read more
0 Reviews

Acceleration ABCs - S is for Security

Sometimes putting security solutions in place will undo all the work that has been done to accelerate an application.  I'm not saying throw security out the window as acceleration is more important, both are equally important and can work... Read more
0 Reviews

The Networking ABC's - A through Z

In yesterday's post, I finished up my Networking ABC's with the final post of Z.  For those of you who can't find my ABCs tag list on my blog, I figured I'd list them all for you in one place.  A is for AuthB is for... Read more
0 Reviews

The Unpossible Task of Eliminating Risk

An ant named Archimedes is in a hole 6' deep. He climbs half the distance to the top every hour. How long does it take for him to escape the hole? Trick question. He can never, mathematically, escape. Realistically, we know that when... Read more
0 Reviews

8 things you can do with an ADC to make your apps secure, fast, and available

An application delivery controller (ADC) essentially acts a reverse proxy. That means that client requests interact with the ADC, and the ADC interacts with web and application servers on the client's behalf. This mediation offers t... Read more
0 Reviews