F5 Networks

Displaying 1-40 of 223 results

  • White Papers // Dec 2013

    Case Study: Insurance Provider Broadens Customer Experience, Boosts Security with Integrated F5 Solution

    Download this case study to learn how Pekin Insurance made use of F5 integrated security solution to secure their new customer service portal, optimize network and streamlined administration. The solution gives Pekin a secure yet flexible foundation for future applications, and a savings of almost $50,000.

    Provided By F5 Networks

  • White Papers // Dec 2013

    Whitepaper: Security and Speed

    The problem of security implications for performance is growing as the number of devices or procedures deployed between the user and applications continues to grow. Download this whitepaper to learn more about how the right security mechanisms and approaches can minimize performance degradation.

    Provided By F5 Networks

  • White Papers // Nov 2013

    Mitigating DDoS Attacks with F5 Technology

    Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks, session attacks, application attacks, and business logic attacks. Read about an effective anti-attack technology for each layer of taxonomy.

    Provided By F5 Networks

  • White Papers // Nov 2013

    How to Operationalize Web Application Security

    This white paper explains how the Persistent Threat Management model of security eliminates the "man-in-the-middle" bottleneck that prevents the scalability of web application security solutions vital to preventing today's pervasive attacks from succeeding. Find out how PTM can help you automate the process of scanning and mitigating 80 percent of...

    Provided By F5 Networks

  • White Papers // Nov 2013

    Secure, Optimized Global Access to Corporate Resources

    The mission is to connect any user from any device from any location to wherever the application lives, securing and optimizing the delivery of content. Find out how you can provide the unified, optimized, and secure access that organizations and their users and customers need.

    Provided By F5 Networks

  • White Papers // Nov 2013

    Software Defined application Services

    Today, service providers and enterprises need to efficiently provision application services based on the demands and needs of individual subscribers and services. Successful management of network and application infrastructure requires flexibility and dynamism across data centers, clouds, and managed environments. Learn how application delivery can evolve in alignment with emerging...

    Provided By F5 Networks

  • White Papers // Nov 2013

    Security and Speed

    Competitive organizations require a solution that cuts the security overhead dramatically while optimizing application delivery to mitigate any remaining reductions in performance. Download this white paper to learn how you can both maintain performance and raise the overall security posture of the organization.

    Provided By F5 Networks

  • White Papers // Nov 2013

    F5 Synthesis: Applications without Constraints

    F5 Synthesis is a new model for application services, an architectural vision for delivering device, network, and application services without constraints. Discover how F5 Synthesis can help you deliver the applications businesses securely, rapidly, and reliably by leveraging a high-performance services fabric.

    Provided By F5 Networks

  • White Papers // Nov 2013

    Defending Against Denial of Service Attacks

    This whitepaper utilizes end-user interviews to better understand their DDoS defense plans where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and...

    Provided By F5 Networks

  • White Papers // Oct 2013

    The DDoS Threat Spectrum

    Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging...

    Provided By F5 Networks

  • White Papers // Oct 2013

    Mitigating DDoS Attacks with F5 Technology

    Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains...

    Provided By F5 Networks

  • White Papers // Oct 2013

    The Application Delivery Firewall Paradigm

    The increasing sophistication, frequency, and diversity of today's network attacks are overwhelming conventional stateful security devices at the edge of the data center. A new data center architecture based on the security services of the F5 application delivery firewall solution effectively combats modern attacks while providing significant CapEx savings.

    Provided By F5 Networks

  • White Papers // Jul 2013

    Simplifying Security for Mobile Networks

    At a time of growing demand on their mobile networks, Communications Service Providers (CSPs) are increasingly challenged to provide highly available service and excellent subscriber experiences - without further eroding service margins. Several trends are working against CSPs: the exploding number of subscriber devices, the expanding use of bandwidth-intensive applications...

    Provided By F5 Networks

  • White Papers // Jul 2013

    Vulnerability Assessment with Application Security

    Security is a never-ending battle. The bad guys advance, organizations counter, bad guys cross over - and so the cat and mouse game continues. The need to properly secure web applications is absolute. Knowing what vulnerabilities exist within a web application can help organizations contain possible points of exposure. BIG-IP...

    Provided By F5 Networks

  • White Papers // Jun 2013

    Virtual Clustered Multiprocessing (vCMP)

    Data center consolidation and virtualization have changed the way organizations look at CapEx and OpEx. Gone are the days when adding new capacity or applications was simply accomplished by buying \"More\". Today, CIOs and architects are looking to maximize the return on investment in hardware and software through virtualization technologies...

    Provided By F5 Networks

  • White Papers // Jun 2013

    VXLAN and the BIG-IP Platform

    The pressure on network operations to support a growing, dynamic, and volatile set of technologies continues to increase. IT organizations are adopting technologies like cloud computing to realize the operational benefits of economies of scale and more effectively manage the explosive growth of data, devices, and applications. As organizations undertake...

    Provided By F5 Networks

  • White Papers // Jun 2013

    The Programmable Network

    IT organizations are continuing to adopt technologies like cloud computing in an effort to realize the operational benefits of economies of scale and more effectively manage the explosive growth of data, devices, and applications. As they undertake the transformation required to support the more fluid and agile environment associated with...

    Provided By F5 Networks

  • White Papers // Jun 2013

    F5 BIG-IP Application Acceleration Manager in Data Replication Environments

    The internet has been in common use for nearly two decades - long enough to reveal where bottlenecks are and highlight the throughput limitations of Wide Area Networks (WANs). Data loads are constantly on the rise: where transmissions once included only plain-text email and a few static web hits, people...

    Provided By F5 Networks

  • White Papers // Jun 2013

    The Shortfall of Network Load Balancing

    The way in which applications are consumed has undergone rapid and significant change in recent years - both in the growing list of user device types to support, each with its own unique requirements, and in how those devices are connected, with variations in network characteristics between fixed, mobile, and...

    Provided By F5 Networks

  • White Papers // Jun 2013

    Secure Application Delivery

    The last several years have seen the usual sea of change in IT - and by extension IT security - systems. Moore's law, in addition to describing advancements in computing power, has led to more complex algorithms for encryption. The ability to process more has, for example, driven SSL encryption...

    Provided By F5 Networks

  • White Papers // Jun 2013

    Maximizing Data Center Efficiency with F5 BIG-IP AAM

    Network traffic is continuing to grow, both in volume of requests and the size of responses. Organizations need a comprehensive solution to the entire array of challenges this trend creates. While implementing one form of application acceleration may solve some of the issues a modern application faces, a comprehensive set...

    Provided By F5 Networks

  • White Papers // May 2013

    Symmetric Optimization in the Cloud with BIG-IP AAM VE

    WAN optimization is designed to decrease the amount of traffic an organization transmits over its corporate WAN connection. This process, sometimes called data reduction, uses a combination of de-duplication and compression to reduce the size of data transfers. The net result is a reduction in the amount of data physically...

    Provided By F5 Networks

  • White Papers // Apr 2013

    Managing the Cloud with BIG-IQ Cloud

    The adoption of cloud solutions continues unabated. As enterprise organizations have continued to expand their use of cloud strategies, they have enjoyed related benefits, particularly that of agility. An October 2012 survey conducted on behalf of redwood software reported that 63 percent of enterprises that have implemented cloud solutions report...

    Provided By F5 Networks

  • White Papers // Apr 2013

    Automating F5 Application Services for VMware with F5 BIG-IQ Cloud

    Expectations of enterprise IT have changed and virtualization has already made silos of physical infrastructure hosting a single application obsolete. Self-service portals, with near instantaneous provisioning and lower costs, are the epitomes of the new goal: cloud computing. VMware is the leader in the private cloud space with its vCloud...

    Provided By F5 Networks

  • White Papers // Mar 2013

    Post-TMG: Securely Delivering Microsoft Applications

    With the recently announced departure of Microsoft forefront Threat Management Gateway (TMG), many organizations currently using or considering TMG face a dilemma: how, or more importantly, what will administrators use to secure their internet-facing Microsoft applications such as exchange, SharePoint, and Lync? Securely deploying an application to the Internet requires...

    Provided By F5 Networks

  • White Papers // Feb 2013

    Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

    Information technology recognizes defense in depth as a best practice in system protection. Defense in depth fortifies infrastructure and systems with a layered security approach. Firewalls are stationed at the edge of the network and security mechanisms are usually deployed at every segment. If attackers circumvent the first layer, the...

    Provided By F5 Networks

  • White Papers // Jan 2013

    Solving Substantiation with SAML

    Proving or asserting one's identity in the physical world is often as simple as showing a driver's license or state ID card. As long as the photo matches the face, that's typically all that is needed to verify identity. This substantiation of identity is a physical form of authentication, and...

    Provided By F5 Networks

  • White Papers // Jan 2013

    F5 ADC Comparative Performance Report

    In the most recent ‘Gartner Magic Quadrant’ report published in November of 2012 F5 BIG-IP was named the #1 ADC and the best solution for VDI and complex deployments. For six years, F5 has published the industry’s most accurate performance testing report. This report shows the results of rigorous Application...

    Provided By F5 Networks

  • White Papers // Dec 2012

    Guarantee Delivery and Reliability of Xen App and Xen Desktop

    As Cloud, VDI, and BYOD converge upon IT, it can be challenging to meet performance and security expectations. Citrix XenDesktop and Citrix XenApp, -- coupled with F5 ADCs -- enable you to meet business objectives while streamlining IT and creating a flexible foundation that adapts to new clients and devices...

    Provided By F5 Networks

  • White Papers // Dec 2012

    Enhancing VMware View with F5 Solutions

    T departments are challenged to ensure high performing, reliable access to virtual desktops as concurrent desktop connections increase, and end users demand flexibility, multiple access options, and desktop customization. With F5, VMware delivers on the promise of flexible, fast, easy, and always available virtual desktops. Together F5 and VMware optimize...

    Provided By F5 Networks

  • White Papers // Nov 2012

    Integrating the Cloud: Bridges, Brokers, and Gateways

    For many organizations, hybrid cloud architecture is the best way to take advantage of the benefits of public cloud computing resources without compromising on security or operational control. Hybrid cloud architectures can be enabled in several ways, each offering various degrees of operational consistency and control over the integrated environment....

    Provided By F5 Networks

  • White Papers // Nov 2012

    Adaptable Resilient VDI Deployments

    VDI deployment is a worthy undertaking for lightening the desktop footprint, centralizing application administration, and covering licensing concerns. But it is a complex system that increases the network burden, and can require configuration efforts beyond normal workloads. Read this paper for important factors you should consider when planning to implement...

    Provided By F5 Networks

  • White Papers // Oct 2012

    F5 and Infoblox DNS Integrated Architecture: Offering a Complete, Scalable, Secure DNS Solution

    Many organizations are looking for a complete DNS solution that will enable best-of-breed features in DNS management, intelligent Global Server Load Balancing (GSLB), performance, and security. Traditionally, there has been a gap between the easy management features offered by DNS appliance vendors and application delivery vendors focused on GSLB. This...

    Provided By F5 Networks

  • White Papers // Aug 2012

    Designing F5 Application Delivery to Maximize Business Value

    Today's business challenges are radically different from before the internet and the explosion of mobile devices. Generation Z members are trickling into the workforce and changing its demographics, bringing new challenges for IT departments. This new workforce wants to bring their own devices to the enterprise; use social media to...

    Provided By F5 Networks

  • White Papers // Jun 2012

    Managing the Migration to IPv6 Throughout the Service Provider Network

    Service providers are feeling increasing pressure to transition from the well-known and universal Internet Protocol version 4 (IPv4) standards to the newer IPv6 standard, while still supporting both network topologies. There are many reasons for this, not the least of which are the continually shrinking number of available IPv4 addresses...

    Provided By F5 Networks

  • White Papers // Jun 2012

    Six Common Challenges of Cloud Implementations

    Ask several different organizations why they are implementing a private cloud, and the users are likely to receive several different reasons. Ask several people within any one organization why they are implementing a private cloud, and the user are still likely to receive several very different reasons, especially if those...

    Provided By F5 Networks

  • White Papers // Jun 2012

    F5 PRO-enabled Monitoring Pack for Microsoft System Center: Automated Provisioning

    Data center management is potentially the most critical part of running any type of data center, yet it typically remains one of the least mastered and understood. It is ironic, then, that the tools used to manage the entire data center are often disparate and isolated, most often deployed piecemeal...

    Provided By F5 Networks

  • White Papers // May 2012

    Dynamic Perimeter Security with IP Intelligence

    Attack methodologies change. Threat vectors change. Once-powerful defenses become obsolete. As the pace of these changes increases, it's unrealistic to wait for defense methods to catch up, or for new products to be developed and releases pushed out. Financial enterprises need near real-time host protection, where the bad actors are...

    Provided By F5 Networks

  • White Papers // May 2012

    Application Delivery in the Cloud: Minimizing Disruption and Maximizing Control

    Cloud computing offers the promise of IT resources on demand with minimal management and capital overhead by enabling real-time scaling, rapid application deployment, and IT agility. It delivers on this promise by building on server virtualization, now a widespread technology. Cloud computing enables organizations to isolate multiple entities or tenants,...

    Provided By F5 Networks

  • White Papers // Apr 2012

    Unified Communications Needs Unified Infrastructure

    As technology solutions converge, resulting systems' supporting infrastructure tends to fragment. This dichotomy is clearly present in the data center with respect to Unified Communications Systems (UCS) implementations based around Microsoft Lync server 2010. The fragmentation of supporting infrastructure tends to occur because previous generations of infrastructure focused on only...

    Provided By F5 Networks

  • White Papers // Nov 2013

    Mitigating DDoS Attacks with F5 Technology

    Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks, session attacks, application attacks, and business logic attacks. Read about an effective anti-attack technology for each layer of taxonomy.

    Provided By F5 Networks

  • White Papers // Nov 2013

    How to Operationalize Web Application Security

    This white paper explains how the Persistent Threat Management model of security eliminates the "man-in-the-middle" bottleneck that prevents the scalability of web application security solutions vital to preventing today's pervasive attacks from succeeding. Find out how PTM can help you automate the process of scanning and mitigating 80 percent of...

    Provided By F5 Networks

  • White Papers // Nov 2013

    Secure, Optimized Global Access to Corporate Resources

    The mission is to connect any user from any device from any location to wherever the application lives, securing and optimizing the delivery of content. Find out how you can provide the unified, optimized, and secure access that organizations and their users and customers need.

    Provided By F5 Networks

  • White Papers // Nov 2013

    Software Defined application Services

    Today, service providers and enterprises need to efficiently provision application services based on the demands and needs of individual subscribers and services. Successful management of network and application infrastructure requires flexibility and dynamism across data centers, clouds, and managed environments. Learn how application delivery can evolve in alignment with emerging...

    Provided By F5 Networks

  • White Papers // Nov 2013

    Security and Speed

    Competitive organizations require a solution that cuts the security overhead dramatically while optimizing application delivery to mitigate any remaining reductions in performance. Download this white paper to learn how you can both maintain performance and raise the overall security posture of the organization.

    Provided By F5 Networks

  • White Papers // Nov 2013

    F5 Synthesis: Applications without Constraints

    F5 Synthesis is a new model for application services, an architectural vision for delivering device, network, and application services without constraints. Discover how F5 Synthesis can help you deliver the applications businesses securely, rapidly, and reliably by leveraging a high-performance services fabric.

    Provided By F5 Networks

  • Case Studies // May 2008

    Financial Application Service Provider Improves Security and Network Performance With a Single, Integrated Solution From F5

    FMR specializes in providing software and services for the financial services market in Israel. The company wanted to maintain tight security for sensitive financial data and improve network management to deliver improved service for clients. The challenge was to increase system usage and provide remote network access to hosted applications....

    Provided By F5 Networks

  • Case Studies // Jun 2008

    School District Implements Cost-Effective Remote Access With FirePass From F5 Networks

    The West Chester Area School District is one of the largest districts in Pennsylvania. Of late, the district upgraded its server operating system, which also prompted a look at upgrading the district's Citrix VPN solution. They wanted to be able to use a web interface for terminal sessions rather than...

    Provided By F5 Networks

  • Case Studies // May 2008

    Engineering Firm Improves Collaboration, Lowers Travel Costs, Boosts Bandwidth by 230 Percent Using F5 WANJet

    Graef, Anhalt, Schloemer & Associates GASAI's great success had led to rapid growth and a subsequent strain on the company's Wide Area Network (WAN). All applications are housed in the central Milwaukie, Wisconsin, data center, with all Internet traffic routed over T1 lines through a Milwaukie-based proxy server. The GASAI...

    Provided By F5 Networks

  • White Papers // Aug 2008

    Acceleration 101

    Getting applications to work properly over a Wide Area Network (WAN) is a complex task, and it is not likely to get easier any time soon. Trends such as data center consolidation, the advent of Web 2.0 applications, and the move to web-based application delivery have only served to increase...

    Provided By F5 Networks

  • White Papers // Jun 2008

    Green IT: The Three "R"S

    In general, efforts to "Go green" have focused solely on reducing the impact of hardware on the environment through a reduction in power consumption and heat generation. The former consumes less resources and the latter requires less cooling, which decreases the power consumed by those devices. These efforts have dual...

    Provided By F5 Networks

  • White Papers // Jun 2009

    Unified Application and Data Delivery: A Model for Creating Dynamic IT Infrastructure

    For many decades, the essential business relationships between users, applications, and data remained static. IT administrators controlled IT resources, operations, and access methods manually. This resulted in a tightly bound physical and operational infrastructure that increased cost, and more importantly, slowed the organization's ability to respond to change. New business...

    Provided By F5 Networks

  • White Papers // Feb 2009

    Deployment Guide: Deploying F5 Automated: Network Provisioning for VMware Infrastructure

    Both VMware Infrastructure and the F5 BIG-IP system offer rich Application Programming Interfaces (APIs) that allow administrators to programmatically gather information or take actions through a variety of client libraries and languages. Additionally, VMware Infrastructure and ESX Server include the ability to take actions according to specific trigger events specific...

    Provided By F5 Networks

  • White Papers // Jan 2009

    Automated DR Traffic Management With VMware SRM and the F5 BIG-IP

    Organizations using F5 and VMware can take advantage of a complete solution for automated disaster recovery between two data centers. This paper summarizes a solution for enabling VMware vCenter Server to automate the failover of the network portion of the application infrastructure, in the event that a vCenter Site Recovery...

    Provided By F5 Networks

  • White Papers // Jun 2008

    Vulnerability Assessment Plus Web Application Firewall (VA+WAF)

    New technology developed by WhiteHat Security and F5 Networks enables organizations to immediately mitigate discovered vulnerabilities using a web application firewall. WhiteHat's Sentinel service provides continuous assessments of web applications for vulnerabilities. Once detected and validated by WhiteHat, detailed information about these vulnerabilities are passed to the F5 BIG-IP Application...

    Provided By F5 Networks

  • White Papers // Sep 2008

    Get to Know GPO

    With the explosive growth of road warriors, telecommuters, temporary workers, and mobile users, it is virtually impossible for organizations to ensure that endpoint devices remain secure and compliant. Even devices that initially are fully compliant may become non-compliant when settings are inadvertently changed or when new corporate policies are implemented....

    Provided By F5 Networks

  • White Papers // Jun 2008

    Complying With PCI DSS Requirement 6.6

    In April 2008, PCI Security Standards Council (SSC) publically released a clarification on PCI DSS Requirement 6.6 and provided two possible options to use for business compliance. The compliance deadline for Requirement 6.6 remains on June 30th, 2008, and with released clarifications, companies now have enough information and options to...

    Provided By F5 Networks

  • White Papers // Apr 2009

    Intelligent Layer 7 DoS and Brute Force Protection for Web Applications

    Both Denial of Service (DoS) and Brute Force Attacks have existed for many years, and many network devices tout the ability to withstand them. However, most of today's DoS attacks target layer 7 (L7) by overwhelming applications with seemingly valid requests and Brute Force programs can send more than one...

    Provided By F5 Networks

  • Case Studies // Nov 2008

    Beyond the Simple "Light Switch": Why North America's Leading MLS Provider Replaced NetScaler With F5 for Better Optimization, Control and Lower TCO

    As one of the largest Internet-based MLS (Multiple Listing Service) providers in North America, Rapattoni Corporation required fast, consistent client access to their applications and data, from any locale, using any system. The challenge was increase in traffic, needed continuous, uninterrupted access to data and required targeted compression capability. The...

    Provided By F5 Networks

  • Case Studies // Aug 2009

    Ticket Marketplace Improves Customer Experience With Highly Scalable Infrastructure From F5

    StubHub, an online ticket marketplace, enables fans to buy and sell tickets for live entertainment events. When the company was purchased by eBay, it redesigned its network infrastructure and included the VIPRION Application Delivery Controller from F5. With higher site traffic capacity and availability, StubHub can continue to enhance the...

    Provided By F5 Networks

  • Case Studies // Nov 2008

    Vurv Technology Streamlines Hosting Environment and Enhances Security With BIG-IP LTM 8400 and Application Security Manager

    Vurv Technology provides companies of all sizes with on-demand talent management solutions for recruitment, onboarding, performance, and compensation management. The challenge was to simplify hosting environment and simplify and optimize security environment. It deployed BIG-IP Local Traffic Manager (LTM) 8400 and BIG-IP Application Security Manager (ASM) that resulted in streamlined,...

    Provided By F5 Networks

  • Case Studies // Jun 2009

    National Insurance Institute of Israel Optimizes Security and Network Performance With F5

    The National Insurance Institute of Israel (NIOI) is responsible for the social stability of Israeli residents. The challenge was to maintain tight security for sensitive financial data, improve network management to deliver enhanced service for clients, to increase system usage and to provide remote network access for hosted applications. NIOI...

    Provided By F5 Networks

  • Case Studies // Apr 2009

    TEVA Sante Secures Online Pharmaceutical Ordering Application With BIG-IP ASM

    PharmaML is a new protocol aimed at standardizing stock management processes in France's pharmaceutical industry. TEVA Sante, one of the largest generic pharmaceutical companies in the world, recognized that the new standard presented data security issues. The company began a major IT project focused on addressing these issues while still...

    Provided By F5 Networks

  • White Papers // Aug 2009

    Optimizing VMware View VDI Deployments With F5

    Corporate desktop usage and management has long been a necessary evil for IT groups. Most employees need full desktops and there are usually multiple types of desktops required for different business units: XP for accounting, Mac for creative design, Vista for sales and people in the field, Linux for technical...

    Provided By F5 Networks

  • White Papers // Oct 2008

    F5 FirePass Endpoint Security

    As SSL VPN technology becomes more mainstream and organizations extend their internal infrastructures to users who are not necessarily employees, endpoint security has become an increasing concern. It is no longer enough to protect assets from an unknown malicious intruder. Organizations need to protect against employees connecting from unpatched home...

    Provided By F5 Networks

  • Case Studies // Sep 2009

    IT Security Provider Optimizes Website, Offers Single-Box Solution to Customers With BIG-IP v10

    BlueFort Security is highly experienced in delivering customer solutions based on the BIG?IP Application Delivery Networking system. After testing the beta version of BIG?IP version 10 (v10), the company was so convinced of the value of the upcoming release that it deployed the beta to its production web servers. With...

    Provided By F5 Networks

  • Case Studies // Aug 2009

    First American Improves Application Performance and Mobility With F5 and VMware

    The First American Corporation, a Fortune 500 company based in Santa Ana, California, supplies businesses and consumers with online information in five primary industry segments, including title insurance and services, specialty insurance, and data and analytics. First American is the country's largest such information provider. Traditionally, each business unit had...

    Provided By F5 Networks

  • Case Studies // Feb 2009

    American Internet Services Protects Customers From Spam and Speeds Email Delivery With F5 Solution

    American Internet Services (AIS) is the fastest growing provider of data center and colocation services in Southern California, serving businesses of all sizes from startups to Fortune 10 corporations. Slow email delivery and a high volume of spam messages had resulted in an increasing number of customer complaints. By implementing...

    Provided By F5 Networks

  • Case Studies // Dec 2008

    Casero Creates Customized Services for Telecom Clients Using F5 BIG-IP LTM and iRules

    Casero is a Web 2.0-based application company that provides white-label solutions to telecommunication service providers in North America and Europe, including BT, Bell Canada, Eircom, BSkyB, SaskTel, Dependable Home Tech, and Cincinnati Bell. The challenge was to provide a unified, seamless user experience drawing from two separate back-end systems, avoid...

    Provided By F5 Networks

  • Case Studies // Dec 2008

    CCTV.com Streams Beijing 2008 Content to 25 Million Online Users With F5 Solutions

    CCTV.com is the Internet arm of China Central Television (CCTV), the largest broadcaster in mainland China. The challenge was to maintain infrastructure reliability during high traffic period of the Beijing 2008 Games, to ensure fast and secure user access to web content, to protect against DDoS attacks and to optimize...

    Provided By F5 Networks

  • Case Studies // Nov 2008

    Credit Cooperatif Secures Its Online Banking Services With F5 BIG-IP Application Security Manager

    Credit Cooperatif is a bank serving co-operative or grouped enterprises: small and medium enterprises and industries (SMESMI); associations; public interest organizations and services; and private individuals. The challenge was to stay ahead of application security threats and to ensure optimal quality of service. Credit Cooperatif deployed BIG-IP Local Traffic Manager...

    Provided By F5 Networks

  • Case Studies // Aug 2009

    F5 Drops 60 Percent of Spam From IT Infrastructure With BIG-IP Message Security Module

    Increasing spam levels put a persistent and growing strain on those resources. By implementing F5 BIG-IP Message Security Module (MSM), F5's IT department has been able to drop 60 percent of unwanted inbound email before it reaches the IT infrastructure. This has resulted in a significant cost savings, a more...

    Provided By F5 Networks

  • Case Studies // May 2009

    Financial Services Provider FNZ Invests in Future Prosperity With a Solid Network Foundation From F5

    Founded just four years ago, FNZ of Wellington, New Zealand, operates the financial services industry's most complete third-party, online account management service. The challenge was to deliver excellent online user performance, to provide 24/7 uptime for online clients, to eliminate security vulnerabilities and to establish a highly scalable infrastructure to...

    Provided By F5 Networks

  • White Papers // Aug 2009

    Global Distributed Service in the Cloud With F5 and VMware

    The term "Cloud computing" has been a prevalent, forward-thinking component of IT for the past year, fueled by new technologies in the local data center such as virtualization. Like most new terms in technology, cloud computing means different things to different people. On one end of the spectrum, it's nothing...

    Provided By F5 Networks

  • White Papers // Jan 2010

    Controlling the Cloud: Requirements for Cloud Computing

    Cloud computing represents not a revolution but an evolution of existing enterprise computing architectures, dating back to the first instance of networked computing. The difference is that today there are vast advances in virtualization in nearly every aspect of the data center. There has also been an emergence of a...

    Provided By F5 Networks

  • White Papers // Apr 2010

    Availability and the Cloud

    Cloud computing, while still evolving in all its iterations, can offer IT a powerful alternative for efficient application, infrastructure, and platform delivery. As businesses continue to embrace the cloud as an advantageous application delivery option, the basics are still the same: scalability, flexibility, and availability to enable a more agile...

    Provided By F5 Networks

  • White Papers // Mar 2010

    Cloud Balancing: The Evolution of Global Server Load Balancing

    While cloud balancing sounds like a futuristic concept, it is actually based on proven, well-understood global application delivery technology. Today, large organizations already use global application delivery to enhance application performance, ensure availability, and control the costs associated with application delivery. Cloud balancing provides the means by which organizations with...

    Provided By F5 Networks

  • White Papers // Mar 2010

    The Optimized and Accelerated Cloud

    Cloud computing is an interesting change in the data center because it simultaneously offers huge benefits and brings huge risks to enterprise IT. The benefits come from providing a much more dynamic and agile computing environment for any application, as well as helping IT move expensive assets outside its own...

    Provided By F5 Networks

  • White Papers // Jan 2010

    BIG-IP Version 10.1: An Integrated Application Delivery Architecture

    For enhanced efficiency and performance, dynamic data centers needs contextual application delivery that can manage applications on access and network conditions. This need has been taken care of by F5 BIG-IP v10.1, on access and network conditions Application Delivery Controller (ADC) that provides sophisticated, integrated, contextual application management on a...

    Provided By F5 Networks

  • White Papers // Nov 2009

    Caching Behavior of Web Browsers

    It is interesting to note how the contents of a web page can be stored in the browser's cache so it doesn't need to be re-requested and re-downloaded. Thus, efficiently using the browser cache can improve end user response times and reduce bandwidth utilization. The cache-ability of an item on...

    Provided By F5 Networks