Skip the navigation

F5 Networks White Papers

IT white papers and technology resources for implementing and optimizing IT strategy, enterprise solutions, technology products, and more.

Move Mission-Critical Apps to the Cloud with AWS and F5

Enterprises moving production workloads, including critical apps, in the public cloud have a lot to consider. Read this paper to learn about adoption inhibitors of the cloud, potential solutions, and how advanced Application Delivery Controller (ADC) technologies are critical to a broader cloud adoption.

Sponsor: F5 Networks


 

Where You Mitigate Heartbleed Matters

There are a variety of opinions on the seriousness of Heartbleed being put forth from "it's not the end of the world" to "the sky is falling, duck and cover." Sites tracking the impact of users suggest many of the largest sites have potentially been impacted, translating into many millions of users. And then there's the impact on gadgets and devices we might not immediately think of being vulnerable. There are a variety of points within the data path where solutions could be put into place to mitigate this (and similar) vulnerabilities. Read this article to learn more about why customers must choose the most strategic point in the network at which to deploy their selected mitigation.

Sponsor: F5 Networks


 

Do More With Less: How CARFAX Consolidated Their Security Solutions

CARFAX, a leading provider of vehicle history information, needed to protect its website from attacks, ensure website availability, prevent data theft, and enhance the scalability of its infrastructure. Through a consolidated F5 solution, CARFAX cut site downtime to zero, secures its data, and deployed a high-performance infrastructure to support its rapid growth.

Sponsor: F5 Networks


 

Fight Malware, Malfeasance and Malingering

Every year brings an even more extreme set of threats to the enterprise than the last. Spam email used to be the number one headache. Now it's been replaced with malware, spear phishing, and the infamous spin-off of the two, the advanced persistent threat (APT). Employee internet usage is also changing in ways that challenge traditional enterprise security. If not managed effectively, all of these issues have the potential to be very costly for the organization. The good news is that enterprises have a range of mitigation options. The question is which solution offers the organization the greatest protection and control without adding complexity or unnecessary costs. Download this whitepaper to learn how F5's Secure Web Gateway Services provide the broadest and deepest coverage available to enterprises today.

Sponsor: F5 Networks


 

F5 Data Center Firewall Aces Performance Test

Huge data center, check. Multiple 10G Ethernet pipes, check. Load Balancer, check. Firewall? Really? Do network architects need to buy yet another box and likely take a performance hit? Not according to F5 Networks, which says its BIG-IP 10200v with Advanced Firewall Manager (AFM) can handle traffic at 80-Gbps rates while screening and protecting tens of millions of connections and simultaneously load-balancing server traffic. In this exclusive Clear Choice test, Network World put those claims to the test. Read how F5 performed.

Sponsor: F5 Networks


 

The DDoS Threat Spectrum

Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.

Sponsor: F5 Networks


 

The Opportunities and Challenges of the Cloud

The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both private and public deployment models. In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the opportunities and challenges of the cloud.

Sponsor: F5 Networks


 

Mitigating Multiple DDoS Attack Vectors

Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture. It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats. Download this infographic to learn more.

Sponsor: F5 Networks


 

Need to Replace MS Threat Management Gateway?

A large number of organizations have relied upon Microsoft Forefront Threat Management Gateway (TMG) for remote access and application publishing, as well as to secure their outbound web traffic. While implementing their TMG replacement strategy, enterprises may be neglecting the last piece of the puzzle--forward web proxy. An effective solution will include various features that work in concert to ensure secure and managed access. Read this article to learn how F5's Secure Web Gateway solution provides a full set of features that can help you successfully migrate from TMG, secure your outbound web traffic, and protect your data and network.

Sponsor: F5 Networks


 

The Shortfall of Network Load Balancing

Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access from anywhere, at any time, on any device. Read this paper to learn why applications fail, why network load balancing alone offers little protection, and why context-aware application delivery is so critical to making mission-critical applications highly available, fast and secure.

Sponsor: F5 Networks


 

Leave No App Behind with Software Defined Application Services

F5 Software Defined Application Services (SDAS) is the next-generation model for delivering application services. SDAS takes advantage of F5 innovations in scalability models, programmability, and an intrinsic decoupling of data and control planes to create a unique application service fabric capable of extending the benefits of F5 application delivery services to all applications, irrespective of location. SDAS is the first fabric-based application delivery and control system. It enables service injection, consumption, automation, and orchestration across a unified operating framework of pooled resources.

Sponsor: F5 Networks


 

Five Key Issues for DNS - The Next Network Management Challenge

The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. According to a recent IDG Research Services Survey this rate of traffic will only grow. What's driving this increase? The growth in volume is largely attributed to the rollout of new services and applications along with expanding migration to the cloud and traffic spikes according to the respondents. Are you ready for this surge of new services and applications along with potential DNS threats?

Sponsor: F5 Networks


 

Architecting the Network of the Future

Both IT and the business are demanding more of their networks. But networks designed to simply forward packets don't have the capability or the intelligence to understand these high-level, application-related demands. Networks need to change, as does the way IT thinks about them and manages them. In this white paper, see how enterprises can accommodate today's needs while laying the groundwork for supporting tomorrow's more-advanced software-defined networks.

Sponsor: F5 Networks


 

How to Keep Company Assets Secure with Federated Identity and Access Management

As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on procedures in today's siloed, multi-modal computing world. Critical to keeping company assets secure is a strong approach to identity and access management, often using a SaaS delivery model. This Technology Spotlight discusses the growing need for security in today's cloud-based, mobile world of IT, and the rise of SaaS-based solutions.

Sponsor: F5 Networks


 

The ADC's Role in the New Network Infrastructure

Cloud computing and the BYOD trend will impact the design of future datacenters and their supporting networks. To attain the business agility that companies now demand, network infrastructure, including higher-layer network and security services, needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled, that can optimize resource provisioning and consistently apply policies across workloads and platforms. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure.

Sponsor: F5 Networks


 

Three Key Principles to Accelerating Web Applications

Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of accelerating these web applications is to improve the end-user experience with faster page-load times and more responsive interactivity. Read this article to learn more about the essential principles driving web application acceleration technologies today.

Sponsor: F5 Networks


 

Web Application Acceleration: Practical Implementations

Web application acceleration implementations use combinations of three key acceleration principles: 1. Send data as efficiently as possible; 2. Send data as infrequently as possible; and 3. Send as little data as possible. Different combinations can produce very different results and, more importantly, they can require dramatically different investments in time and resources. To decide on the best practical implementation of acceleration technologies for a particular organization, it is important to explore how each implementation employs the key acceleration techniques as well as the costs and benefits that result. Read this whitepaper to learn more about the available application acceleration solutions that focus on reducing administrative overhead while delivering significant performance benefits for users.

Sponsor: F5 Networks


 

DNS Challenges in a Changing Landscape

IDG Research Services surveyed DNS administrators from large organizations to understand the challenges of deploying an available, secure, high-performance DNS infrastructure. Download the infographic to see the survey results.

Sponsor: F5 Networks


 

The F5 ADC is a Platform, Not a Product

Platforms are a key success factor whether we're talking about phones or cloud or Application Delivery Controllers (ADCs). F5's offering--TMOS--has been a platform supporting an extensible ecosystem of application-focused "apps." Over the past 10 years, the ADC market has continued to experience growth with the upper limit on the ADC market constrained only by current definitions. Thus, the ADC must be a platform and not a product to continue to adapt to the needs of applications and businesses over time. Read this article to learn how the ADC ecosystem of capabilities will continue to evolve and transform as needed by the applications it delivers.

Sponsor: F5 Networks


 

Reducing Expenses Starts with the Programming Skills of Operations Groups

Tools available today make it possible to significantly reduce the daily tasks that consume the time of IT operations groups like automation. And with today's new cloud and SDN architectures being deployed or just on the horizon, automation is no longer just optional. No matter what we call it the technology industry looks obsessed with the idea of automation, continuous delivery and programmability. With good reason, because the evidence is all around us-saving time is not trivial if you are starting many cloud instances. The important point, is not that programmability is a magic panacea that may or may not improve the company bottom line, but that employees in system and network administration positions have been asking for investment in these areas for years. Read this article to learn how to implement these concepts, improve the bottom line, and make the dreams of your admins come true.

Sponsor: F5 Networks