F5

Displaying 1 - 10 of 60 results

  • Infographic: Why is App Security Harder than Network Security?

    White Papers // Sep 2016 // provided by F5

    This infographic highlights the major difficulties is in securing applications through the viewpoints of detection, containment, and visibility, while also examining an increase in attacks on applications, and why a rush to release can cause security incidents.

    View this now
  • 2016 DDoS Attack Trends

    White Papers // Sep 2016 // provided by F5

    There are many different forms of DDoS attacks that have faded from the mindshare of the media, however are still prominent threats within the landscape, however they are no longer recieving the attention they require. This report focuses on the experience of veterans of the DDoS defense world, and which ...

    Read more
  • F5 DDoS Attack Quick Reference Sheets

    White Papers // Sep 2016 // provided by F5

    Distributed denial-of-service (DDoS) attacks are a top concern for many organizations today. A DDoS attack saturates a website, renders its services inoperable, and prevents legitimate clients from being able to connect to it. For the uninitiated, this attack can be a scary and stressful ordeal. These templates for quick reference ...

    Download Now
  • The F5 DDoS Playbook: Ten Steps for Combating DDoS in Real Time

    White Papers // Sep 2016 // provided by F5

    Distributed denial-of-service (DDoS) attacks are a top concern for many organizations today. A DDoS attack saturates a website, renders its services inoperable, and prevents legitimate clients from being able to connect to it. For the uninitiated, this attack can be a scary and stressful ordeal. This whitepaper examines how an ...

    Learn more
  • Key Considerations in Deploying an SSL Solution

    White Papers // Aug 2016 // provided by F5

    With privacy breaches becoming increasingly common, many organizations look to SSL as a way to protect the integrity of their data online. However, the implementation of a comprehensive SSL strategy comes with its own challenges of visibility, performance and scale. Through proper planning and deployment, a strong SSL strategy mitigates ...

    Read more
  • The Blind State of Rising SSL/TLS Traffic: Are Your Cyber Threats Visible?

    White Papers // Aug 2016 // provided by F5

    Security solutions designed to monitor network traffic to detect threats and prevent data leakage are becoming less effective as a result of the growing volume of bandwidth associated with cloud-based services and the rising amount of encrypted traffic. This whitepaper provides an overview of SSL/TLS as well as its current ...

    Read more
  • Catholic Education South Australia Provisions Scalable and Secure Applications with F5 Networks - Report

    Case Studies // Jun 2016 // provided by F5

    Catholic Education South Australia (CESA) is the parent body that directs policy development for Catholic schools in South Australia. CESA works in partnership with Catholic schools across South Australia to provide a range of facilities and resources to support Catholic education and families. Their challenges are to increase traffic demands ...

    Download Now
  • Daejeon University Progresses with a Scalable and Secured IT Infrastructure with F5 - Report

    Case Studies // Jun 2016 // provided by F5

    Daejeon University, established in 1980, is one of the leading private universities in Daejeon, South Korea. The university's institute of information and communication provides 24 hours of always available and seamless web applications to 10,000 students and 1,000 faculty members and staffs on and off campus. Their challenges are to ...

    Download Now
  • The Present and Future of Application Protection - Report

    White Papers // Jun 2016 // provided by F5

    In today’s application-centric world, there’s truly an app for everything. Organizations offer applications with data access to employees and consumers to drive greater productivity, meet business demands, and ultimately achieve a competitive advantage. But as organizations deliver more and more sensitive data through applications, they’re also introducing everincreasing risk. That’s ...

    Download Now
  • The State Of Application Delivery - 2016 Report

    White Papers // May 2016 // provided by F5

    Twenty-five years ago, applications were monolithic software programs that ran in huge data centers and were used by the select few. Today, with the Internet and mobile devices—and increasingly, the Internet of Things—having transformed our lives, applications are everywhere and used by nearly everyone. Your business is driven by them, ...

    Download Now