F5 Networks

Is it time to evolve your relationship with native cloud security and performance services?

We’re talking, of course, about your relationship with your cloud provider’s native application services for security and performance. Services which are, admittedly, perfectly fine—until you realize you need more. So, what are the signs that you’ve outgrown those cloud-native security and performance services? Before we go there, it’s worth remembering what attracted you to native

TO ENCRYPT, OR NOT TO ENCRYPT: WHAT IS THE REGULATION?

Regulations in many countries require organizations to secure and encrypt any communications with their customers. The downside: those organizations now have to grapple with threats that hide within encrypted traffic. The use of codes and ciphers to protect sensitive information began thousands of years ago—the well-known “Caesar cipher” is named for Julius Caesar, who used

7 STEPS TO SIMPLIFY MIGRATING ARCHITECTURES TO THE CLOUD

The good news is that if you’re like most companies, you’ve done this before. Many times. About every three to five years you overhaul your core architectures. You adjust how you deliver applications. You strive to increase performance, enhance security, and reduce costs. The bad news is that with cloud, things will be even more

2019 PHISHING AND FRAUD REPORT

Welcome to F5 Labs’ third annual report on phishing and fraud. Once again, we’re bringing you data from our partner Webroot as well as the F5 Security Operations Center. Phishing continues to be a major source of profit for cyber-criminals, and a big hassle for cyber-defenders. In the F5 Labs 2019 Application Protection Report, F5

How malware and bots steal your data

Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the

The App factory: A slow movement towards rapid change

These days, application delivery—especially in large organizations with a mix of new and heritage systems—is a bit … chaotic. Organizations are adopting DevOps practices and tools in an effort to speed up the delivery of applications to customers. But the transition hasn’t been smooth. Culture, tools, team structures, individual roles, and skill requirements are all

F5 and containerization

Organizations constantly struggle between embracing technological changes to open up new business opportunities and protecting the business from new challenges and risks. In this paper, we’ll examine containerization and how the adoption of this technology in F5 products affects IT professionals, architects, and business decision makers.