F5 Networks

Displaying 1-40 of 229 results

  • White Papers // Jun 2015

    Protect Against Evolving DDoS Threats: The Case for Hybrid

    CIOs want harmony. Security directors loathe point products. Network operations won’t buy into anything new. CIOs can get the harmony they need around DDoS mitigation by extending the F5 Application Delivery Controller into a hybrid solution: on-premises with a new cloud component.

    Sponsored By F5 Networks

  • White Papers // Jun 2015

    Complying with PCI DSS 3.0

    New PCI DSS standards are designed to help organizations keep credit card information secure, but can cause expensive implementation challenges. The F5 PCI DSS 3.0 solution allows organizations to protect cardholder data and remain in compliance while cutting costs, increasing efficiencies, and simplifying their network infrastructure.

    Sponsored By F5 Networks

  • White Papers // Jun 2015

    Deploying an Enterprise Mobility Gateway

    More enterprises are granting greater access to corporate resources—wherever they may be located—for authorized users through an ever-increasing number of mobile devices. An Enterprise Mobility Gateway helps organizations scale, manage, secure, optimize, and control today’s required anytime, anywhere network, cloud, and application access.

    Sponsored By F5 Networks

  • White Papers // Aug 2009

    Optimizing VMware View VDI Deployments With F5

    Corporate desktop usage and management has long been a necessary evil for IT groups. Most employees need full desktops and there are usually multiple types of desktops required for different business units: XP for accounting, Mac for creative design, Vista for sales and people in the field, Linux for technical...

    Provided By F5 Networks

  • White Papers // Jan 2009

    Automated DR Traffic Management With VMware SRM and the F5 BIG-IP

    Organizations using F5 and VMware can take advantage of a complete solution for automated disaster recovery between two data centers. This paper summarizes a solution for enabling VMware vCenter Server to automate the failover of the network portion of the application infrastructure, in the event that a vCenter Site Recovery...

    Provided By F5 Networks

  • White Papers // Sep 2009

    Security and Acceleration - The Sweet Spot of Application Delivery

    F5's unified web application security and acceleration in BIG-IPv10 offers an unmatched solution for directing, securing, and accelerating web applications. Retail and remote users receive faster web pages. For IT, it minimizes WAN bandwidth utilization, safeguards web applications, and prevents data leakage, all while directing traffic to the application server...

    Provided By F5 Networks

  • Webcasts // Jan 2010

    Webcast: Securing Your Web Applications

    As more application traffic moves to the web, the information assets are facing new security threats. Web application security is a comprehensive, policy-based method designed to help manage these emerging threats at the application level, so one can prevent attacks that no other firewalls can address. The attendee of this...

    Provided By F5 Networks

  • White Papers // Aug 2009

    Intelligent File Virtualization With F5 ARX

    Enterprises today face the challenge of managing and storing an ever-increasing amount of information. Not only is information being created at an unprecedented rate, but regulatory and business needs are also requiring the preservation of information for longer periods. At the same time, IT organizations must do more with less...

    Provided By F5 Networks

  • White Papers // Sep 2009

    Create A Smarter Storage Strategy

    As file data continues to grow at a rapid pace, businesses are looking for more ways to cut their storage costs and lighten the management burden on IT. But where should one begin? The storage market presents an overwhelming array of choices even to experienced storage veterans, in terms of...

    Provided By F5 Networks

  • White Papers // Jul 2010

    Deploying F5 Application Ready Solutions With VMware View 4.0

    Corporate desktop management has long been a necessary evil for IT groups. Most employees need full desktops, and different business units usually require multiple types of desktops: Windows XP for accounting, Mac for creative design, Windows 7 for sales and people in the field, Linux for technical staff, and so...

    Provided By F5 Networks

  • White Papers // Jan 2010

    Unified Access and Optimization With F5 BIG-IP Edge Gateway: Integrating Security, Availability, and Application Acceleration Services to Enable Context-Aware Networking

    BIG-IP Edge Gateway offers a unique set of features, market-leading capacity and performance, enticing TCO, and ROI value. BIG-IP Edge Gateway integrates with existing enterprise infrastructure and applications while simultaneously providing authentication, authorization, and access to networks, applications and portals. The comprehensive endpoint security helps make corporate compliance easier. Dynamic...

    Provided By F5 Networks

  • White Papers // Jan 2010

    BIG-IP Version 10.1: An Integrated Application Delivery Architecture

    For enhanced efficiency and performance, dynamic data centers needs contextual application delivery that can manage applications on access and network conditions. This need has been taken care of by F5 BIG-IP v10.1, on access and network conditions Application Delivery Controller (ADC) that provides sophisticated, integrated, contextual application management on a...

    Provided By F5 Networks

  • White Papers // Nov 2009

    Caching Behavior of Web Browsers

    It is interesting to note how the contents of a web page can be stored in the browser's cache so it doesn't need to be re-requested and re-downloaded. Thus, efficiently using the browser cache can improve end user response times and reduce bandwidth utilization. The cache-ability of an item on...

    Provided By F5 Networks

  • White Papers // Jan 2010

    Manageable Application Security: BIG?IP Application Security Manager V10.1 Brings the Visibility, Control, and Flexibility Necessary to Defend Applications and Comply With Regulations Without Sacrificing Manageability

    BIG?IP Application Security Manager v10.1 provides the visibility, control, and flexibility that not only help to defend applications but also ensure compliance with regulations without sacrificing manageability. The fact that organizations are required to collect, collate, comb through, and summarize a huge amount of information for management and business stakeholders...

    Provided By F5 Networks

  • White Papers // Jan 2010

    Controlling the Cloud: Requirements for Cloud Computing

    Cloud computing represents not a revolution but an evolution of existing enterprise computing architectures, dating back to the first instance of networked computing. The difference is that today there are vast advances in virtualization in nearly every aspect of the data center. There has also been an emergence of a...

    Provided By F5 Networks

  • White Papers // Apr 2010

    Availability and the Cloud

    Cloud computing, while still evolving in all its iterations, can offer IT a powerful alternative for efficient application, infrastructure, and platform delivery. As businesses continue to embrace the cloud as an advantageous application delivery option, the basics are still the same: scalability, flexibility, and availability to enable a more agile...

    Provided By F5 Networks

  • White Papers // Mar 2010

    Cloud Balancing: The Evolution of Global Server Load Balancing

    While cloud balancing sounds like a futuristic concept, it is actually based on proven, well-understood global application delivery technology. Today, large organizations already use global application delivery to enhance application performance, ensure availability, and control the costs associated with application delivery. Cloud balancing provides the means by which organizations with...

    Provided By F5 Networks

  • White Papers // Mar 2010

    The Optimized and Accelerated Cloud

    Cloud computing is an interesting change in the data center because it simultaneously offers huge benefits and brings huge risks to enterprise IT. The benefits come from providing a much more dynamic and agile computing environment for any application, as well as helping IT move expensive assets outside its own...

    Provided By F5 Networks

  • White Papers // Aug 2009

    Global Distributed Service in the Cloud With F5 and VMware

    The term "Cloud computing" has been a prevalent, forward-thinking component of IT for the past year, fueled by new technologies in the local data center such as virtualization. Like most new terms in technology, cloud computing means different things to different people. On one end of the spectrum, it's nothing...

    Provided By F5 Networks

  • White Papers // Sep 2010

    Optimizing FTP File Transfers With BIG-IP WAN Optimization Module

    File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate files over a TCP/IP-based network, such as the Internet. FTP is built on client-server architecture and utilizes separate control and data connections between the client and server applications. FTP can be used with user-based password authentication...

    Provided By F5 Networks

  • White Papers // Aug 2010

    Hybrid Cloud Application Architecture for Elastic Java-Based Web Applications

    Welcome to the Hybrid Cloud Application Architecture guide for F5 and VMware vCloud systems. This paper has been prepared as an illustration of an architecture that can be adapted to suit the needs of the particular application. Using F5, VMware, GemStone and other freely available components, the authors have prepared...

    Provided By F5 Networks

  • White Papers // Oct 2009

    HIPAA Security Compliance and F5 Solutions

    As more medical information, including patient records, is converted into electronic format and Internet usage continues to grow, healthcare organizations are finding themselves increasingly vulnerable to attacks. The complex challenge of securing information and maintaining strict levels of patient confidentiality is increasingly difficult since web-based systems are widely used in...

    Provided By F5 Networks

  • White Papers // Apr 2010

    Securing the Cloud

    While companies certainly see a business benefit to a pay-as - go model for computing resources, security concerns seem always to appear at the top of surveys regarding cloud computing. These concerns include authentication, authorization, accounting (AAA) services; encryption; storage; security breaches; regulatory compliance; location of data and users; and...

    Provided By F5 Networks

  • White Papers // Feb 2010

    Creating a Hybrid ADN Architecture With Both Virtual and Physical ADCs

    Virtualization has long since moved from an emerging data center technology into a standard deployment tool across organizations of all sizes, regardless of industry. A virtualization survey from Rackspace in August 2007 indicated a strong trust in virtualization, with 72 percent of respondents noting a willingness to deploy virtualized applications...

    Provided By F5 Networks

  • White Papers // Jan 2010

    Netapp Network-Attached Storage: Solution Guide

    Companies deploying new file storage solutions are faced with the challenge of managing downtime and business disruption associated with data migration and consolidation projects. Migrating data is an inherently disruptive and cumbersome operation, as static file mappings are broken and mount points invalidated. To minimize the business impact, IT performs...

    Provided By F5 Networks

  • White Papers // Jan 2011

    Achieving Enterprise Agility in the Cloud

    It's no secret that cloud computing is here to stay - it promises everything from reduced complexity and unlimited scalability to capacity on demand and CapEx savings. Although there are still many unanswered questions about cloud computing, many businesses are optimistic that it will be able to deliver on these...

    Provided By F5 Networks

  • White Papers // Oct 2009

    Simplifying Disk-Based Backup and Restore With NetApp and F5 ARX

    NetApp is at the forefront of streamlined disk-based data protection with its SnapMirror and SnapVault software technologies. SnapMirror enables synchronous or asynchronous replication of active volumes and Qtrees. SnapVault extends this capability by combining the point-in-time consistency of snapshots, versioning, and transport of snapshots to secondary or tertiary tiers of...

    Provided By F5 Networks

  • White Papers // Nov 2010

    Driving Data Migration With Intelligent Data Management

    Every IT team struggles to keep up with storage demands while minimizing downtime and disruptions. The rate of unstructured data growth has made this job increasingly challenging - pushing storage resources to the limit, increasing management complexity, and driving up costs. Additionally, as the volume of data has increased, so,...

    Provided By F5 Networks

  • White Papers // Jan 2011

    Hardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance

    According to a study conducted by Ferris Research in 2008 i Microsoft Exchange Server holds approximately 65 percent market share in email and communications across all organizations. In healthcare organizations with more than 5,000 employees, it enjoys 75 percent penetration; in telecommunications organizations with at least 1,000 employees, it does...

    Provided By F5 Networks

  • White Papers // Aug 2010

    Load Balancing 101: Firewall Sandwiches

    Historically, the most common use of the network-based hardware load balancer and its modern incarnation, the Application Delivery Controller (ADC), has been to provide high availability, scalability, and manageability for the back-end application, particularly at the content tier. Coming in a very close second is providing those same benefits for...

    Provided By F5 Networks

  • White Papers // May 2010

    Providing Security and Acceleration for Remote Users

    The traditional IT model evolved from a world where resources, users, and access methods were under one control. Relationships among users, applications, and data were static and tightly bound; and applications were written with specific display in mind. As remote and then mobile users were added along with partners, contractors,...

    Provided By F5 Networks

  • White Papers // Dec 2010

    F5 BIG‑IP WAN Optimization Module in Data Replication Environments

    The Internet has been in common use for nearly two decades - long enough to reveal where bottlenecks are and highlight the throughput limitations of Wide Area Networks (WANs). Data loads are constantly on the rise: where transmissions once included only plain-text email and a few static web hits, people...

    Provided By F5 Networks

  • White Papers // Jan 2010

    Data Centre Consolidation: Know Where You're Going and Why

    Maintaining a piece of hardware is four to five times more costly than actually acquiring it. This will, of course, come as little surprise to CIOs and IT departments the world over who, particularly in times of economic stress, are focusing attention on reducing operational cost. Saving money, whether on...

    Provided By F5 Networks

  • White Papers // Dec 2010

    F5 and Microsoft Delivering IT as a Service

    To meet the constant demands to deploy, maintain, and grow a broad array of services and applications, IT organizations must continually evaluate the need to add new infrastructure. As organizations add more capacity to their infrastructure, capital and operational expenditures grow in proportion. In order to control these costs, improve...

    Provided By F5 Networks

  • White Papers // Jan 2011

    Optimizing Application Delivery in Support of Data Center Consolidation

    Client-server, distributed content, and ERP applications all promise to improve organizations' productivity, and their bottom line. However, the costs associated with supporting multiple data centers can quickly negate these benefits. CIOs and IT departments that are combating economic stress by focusing attention on reducing operational costs know that maintaining a...

    Provided By F5 Networks

  • White Papers // Jan 2011

    Secure iPhone Access to Corporate Web Applications

    Mobile devices have become computers in their own right, with a huge array of applications, significant processing capacity, and the ability to handle high bandwidth connections. They are the primary communications device for many, for both personal and business purposes. Many IT executives are planning to make internal business applications...

    Provided By F5 Networks

  • White Papers // Nov 2010

    Optimize and Accelerate Applications Across the WAN

    Bandwidth limitations continue to play a significant role in application performance. Most WANs fall into one of two main categories. The first category includes lowerspeed networks such as dial up, frame relay, and many mobile data networks. These networks often range in speed from 56 Kbps to 2 Mbps and...

    Provided By F5 Networks

  • White Papers // Oct 2008

    Acceleration 102: Asymmetric or Symmetric?

    The first, Acceleration 101, describes acceleration features and terms. This paper focuses on topology options for deploying acceleration features in an Application Delivery Network (ADN). Acceleration is an excellent technology for overcoming the limitations inherent in today's networks and applications. An application acceleration solution can significantly reduce application response times...

    Provided By F5 Networks

  • White Papers // Oct 2010

    Big-IP Wan Optimization Module Performance

    An increasing amount of data is being transferred between data centers, driven by data replication and backup, storage requirements, and data center consolidation. The trend toward virtualization and cloud computing, while reducing IT costs and providing agility, also adds latency to application delivery. WAN optimization reduces the replication time and...

    Provided By F5 Networks

  • White Papers // Jan 2011

    Clustered Multiprocessing: Changing the Rules of the Performance Game

    Because improvements in practical computer power lag far behind these exponential hardware improvements, the key to maintaining processor performance has become multiprocessor or multicore design. This white paper details how the Clustered Multiprocessor (CMP) from F5, in combination with TMOS, provides customers with scalability, extensibility, adaptability, and manageability. In reality,...

    Provided By F5 Networks