F5 White Papers

Software-defined Hardware Enabling Performance and Agility with the Big-IP iSeries Architecture

A perfect storm of market trends is shifting the application and IT landscape. Traffic growth continues unabated due to mobile, streaming media, the Internet of Things (IoT), and digital transformation affecting every industry. Cloud adoption is accelerating to respond to enterprise needs for agility and faster deployment as the number of applications increases. Along with the growth in applications and everything connected via the Internet have come security threats, including data breaches and the theft of critical business and personal data. One outcome has been encryption of all data in transit, with SSL traffic doubling in the past year—from 29 percent to 64 percent of all traffic. Lastly, new application architectures and agile development models, including microservices and DevOps, are emerging.Read the white paper here.

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

The end of sale and support of the Cisco ACE product line presents organizations with an opportunity to find a replacement that better meets their operational and business needs. With F5, organizations can build elastic, flexible application delivery fabrics that are ready to meet the challenges of optimizing and securing applications in a constantly evolving environment.Read the white paper here.

Migrating Tier 1 Application Workloads to AWS with F5

Enterprises that are considering migrating or deploying production workloads in the public cloud are most likely to adopt Amazon Web Services (AWS) as their preferred platform. According to Gartner, AWS is the overwhelming market share leader, with over 10 times more cloud Infrastructure as a Service (IaaS) compute capacity in use than all 14 other providers combined in the same magic quadrant1. As the public cloud platform service of choice, AWS supports the broadest range of use cases, including those for enterprise and mission-critical applications2. This paper reviews many of the factors that have inhibited broader adoption of the public cloud for Tier 1 applications and suggest how F5 application delivery services play a critical role in helping accelerate AWS adoption.Read the white paper here.

Integrating the Cloud: Bridges, Brokers, and Gateways

For many organizations, a hybrid cloud architecture is the best way to take advantage of the benefits of public cloud computing resources without compromising on security or operational control. Hybrid cloud architectures can be enabled in several ways, each offering various degrees of operational consistency and control over the integrated environment. As adoption rates of hybrid architectures increase, solutions designed specifically to address challenges with implementation will continue to emerge.Read the white paper here.

Beyond Advanced Threat Protection

As advanced persistent threats dominate the malware landscape, signature-based detection no longer provides adequate protection for the evolving threat environment. Signature-based detection depends on vendors providing signature updates to their platforms. Unfortunately many of today’s threats are targeted or even built specifically to infiltrate a particular organization. Often these threats are only used once and then repackaged and modified to evade detection.Read the white paper here.

Cisco ACE Migration

Cisco has exited the application delivery market and its load balancing products, ACE and GSS, reached an end-of-sale milestone in January 2014. There will be no further software updates or fixes, and Cisco recommends that customers transition to alternative vendor offerings.Read the white paper here.

Connecting the Untethered Employee

Meet Erin—a Philadelphia-based sales rep. At home preparing for a customer visit, she opens her laptop to check email and connect to her company’s CRM system to make a few necessary updates. She lets the dog out, makes a cup of coffee, and before long realizes she’s already running late. She’ll need to finish her CRM entry during the Uber ride using her mobile device.Read the white paper here.

Geolocation and Application Delivery

The data from geolocation providers offers highly valuable data to a variety of stakeholders and is no longer just for advertising. Read the white paper here.

Mitigating DDoS Attacks with F5 Technology

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. Taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks. Read the white paper here.

All F5 White Papers

Extending SDN Architectures with F5’s L4-7 Application and Gateway Services

Accelerating Mobile Access

Access Control in a Mobile World

Adaptable and Resilient VDI Deployments

Application Delivery and Load Balancing for VMware View Desktop Infrastructure

Application Delivery Hardware: A Critical Component

Application Delivery Network Platform Management

Application Delivery Optimization

Application Firewalls

Application Security in the Cloud with BIG-IP ASM

Applied Application Security – Positive and Negative Efficiency

APT Dot Gov: Protecting Federal Systems from Advanced Threats | SANS White Paper

Authentication 101

Automating F5 Application Services for VMware with F5 BIG-IQ Cloud

Automating the Data Center

Bandwidth Management for Peer-to-Peer Applications

BIG-IP Virtual Edition Products, The Virtual ADCs Your Application Delivery Network Has Been Missing

Building a CDN with F5

Business Case for S/Gi Network Simplification

Cloud Balancing: The Evolution of Global Server Load Balancing

Complying with PCI DSS

Conquering Multi-Homed ISP Link Challenges

Considerations for VoLTE Implementation

Controlling the Cloud: Requirements for Cloud Computing

Cookies, Sessions, and Persistence

Creating a Hybrid ADN Architecture with both Virtual and Physical ADCs

Data Centre Consolidation: Know Where You’re Going and Why

Delivering Virtual Desktop Infrastructure with a Joint F5-Microsoft Solution

Deploying a Next-Generation IPS Infrastructure

Deploying an Enterprise Mobility Gateway

Diameter Policy and Charging Control

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks

Dynamic Perimeter Security with IP Intelligence

Dynamic Service Delivery with Intelligent DNS

Enabling Flexibility with Intelligent File Virtualization

Enabling Long Distance Live Migration with F5 and VMware vMotion

Enabling Malware, Phishing Attacks to be Hosted from Genuine Sites

Enabling Policy in the New Mobile Architecture

Enhanced Messaging Security: Slicing Spam & Other Threats At The Network Edge

Enhancing VMware Horizon View with F5 Solutions

F5 and Infoblox DNS Integrated Architecture

F5 and Windows Server 2012 DirectAccess/Remote Access Services

F5 BIG_IP Application Acceleration Manager in Data Replication Environments

F5 BIG-IP Platform Security

F5 DDoS Protection: Recommended Practices

F5 iControl

F5 Reference Architecture for Cisco ACI

F5 Reference Architecture for VMware NSX

F5 Synthesis: A New Application Services Delivery Model for Cloud Providers

Fight Malware, Malfeasance, and Malingering with F5

Filling the Threat Management Gateway Void with F5

Five Ways F5 Improves XenApp or XenDesktop Implementations

Fundamentals of HTTP

Get to Know GPO

Government Executive Need to Know Memo: Cybersecurity

Hardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance

How the F5 Application Services Fabric Can Benefit Your Business

How to Deliver App Services to Every App

How to Future-Proof Application Delivery

Impact of Web Services on the Network

Improving VDI with Scalable Infrastructure

Introduction to the IP Multimedia Subsystem (IMS)

Kerberos Constrained Delegation and Protocol Transition in Smart Card PKI Architecture

LineRate DevOps Reference Architecture

Load Balancing 101: Firewall Sandwiches

Load Balancing 101: Nuts and Bolts

Load Balancing 101: The Evolution to Application Delivery Controllers

Load Balancing Oracle Database Traffic

Managing IPv6 Throughout the Application Delivery Network

Managing the Migration to IPv6 Throughout the Service Provider Network

Message-Based Load Balancing

Microsoft Hyper-V Network Virtualization and the BIG-IP System

Migrating Application Workloads to Public Cloud

Migrating Tier 1 Application Workloads to AWS with F5

Multi-Tenancy Designs for the F5 High-Performance Services Fabric

Multi-Tenancy Security with vCMP

Network Functions Virtualization – Everything Old Is New Again

Network Services and the Cloud

NFV: Beyond Virtualization

NGIPS Recommended Practices F5 BIG-IP and Cisco/Sourcefire NGIPS load balancing

Offloading Remote Authentication for Servers

Operationalizing Elastic Applications

Optimize WAN and LAN Application Performance with TCP Express

Optimizing Application Delivery in Support of Data Center Consolidation

Optimizing Diameter Signaling Networks | Heavy Reading white paper

Protect Against Evolving DDoS Threats: The Case for Hybrid

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution

Protecting Against Online Banking Fraud with F5

Replacing Abstract Zones with Real Application Security Policy

Scaling SIP

Secure Access with the BIG-IP System

Secure Application Delivery

Secure iPhone Access to Corporate Web Applications

Securing Banks in Changing Times

Securing the Cloud

Securing Your Enterprise Applications with the BIG-IP

Security 101: BIG-IP ASM and IPS Differences Defined

Security Solutions for Messaging Systems

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP): A Five-Function Protocol

Seven Data Center Challenges to Consider Before Going Virtual

Simplifying Security for Mobile Networks

Simplifying Single Sign-On with F5 BIG-IP APM and Active Directory

SNMP: Simplified

SOA: Challenges and Solutions

Solving Substantiation with SAML

SQL Injection Evasion Detection

TCP Optimization for Service Providers

The Application Delivery Firewall Paradigm

The DDoS Threat Spectrum

The Expectation of SSL Everywhere

The F5 Access Federation Reference Architecture

The F5 Application Availability Between Hybrid Data Centers Reference Architecture

The F5 Application Services Reference Architecture

The F5 Cloud Bursting Reference Architecture

The F5 Cloud Migration Reference Architecture

The F5 DDoS Protection Reference Architecture

The F5 Intelligent DNS Scale Reference Architecture

The F5 LTE Roaming Reference Architecture

The F5 Security for Service Providers Reference Architecture

The F5 SSL Reference Architecture

The Internet of Things–Ready Infrastructure

The Programmable Network

The Shortfall of Network Load Balancing

Things to consider when moving to Exchange 2013 | Convergent Computing White Paper

TMOS: Redefining the Solution

Top Considerations When Choosing an ADC

Understanding Advanced Data Compression

Unified Application and Data Delivery

Unified Application Delivery

Unified Approach for Securing Wireless, Remote, and Internal LAN Access

Unified Enterprise Mobility with the F5 BIG-IP System

VIPRION Clustered Multiprocessing

Virtual Clustered Multiprocessing (vCMP)

Virtualization Defined – Eight Different Ways

Vulnerability Assessment Plus Web Application Firewall

Vulnerability Assessment with Application Security

VXLAN and the BIG-IP Platform

Web Application Vulnerabilities and Avoiding Application Exposure

Why You Need a Cloud to Call your Own

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

Beyond Advanced Threat Protection

Cisco ACE Migration

Connecting the Untethered Employee

Network Functions Virtualization – Everything Old Is New Again

The Myth of Network Address Translation as Security

A Simplified Application Acceleration Architecture

An Intelligent Services Framework

Application and Data Security with F5 BIG-IP ASM and Oracle
Database Firewall

Building a Cloud-Enabled File Storage Infrastructure

Building an Enterprise Cloud with F5 and IBM

Distributing Applications for Disaster Planning and Availability

Empowering Mobile Users to Work Anywhere, on Any Device

Enable a Scalable and Secure VMware View Deployment

Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform

Extending data center networks to the IBM SmartCloud | IBM White

F5 iApps: Moving Application Delivery Beyond the Network

F5 PRO-enabled Monitoring Pack for Microsoft System Center: Automated Provisioning

Guarantee Delivery and Reliability of Citrix XenApp and XenDesktop

Hybrid Cloud: The Case for an App-Centric Strategy

Investing in security versus facing the consequences | Bloor Research White Paper

Key Considerations in Choosing a Web Application Firewall

Microsoft SharePoint Server 2010 Performance Study | Dell Technical White

Optimizing and Protecting Critical Applications on Integrated Systems

Secure Mobile Access to Corporate Applications

Secure, Optimized Global Access to Corporate Resources

Securing LTE Networks—What, Why, and How

Speeding Oracle Database Replication with F5 WAN Optimization Technologies

Streamlining Oracle Web Application Access Control

Ten Essentials for Securing LTE Networks

The BIG-IP Platform and Microsoft Azure: Application Services in the Cloud

The Present and Future of Application Protection

Caching Behavior of Web Browsers

Data Center Virtualization Q&A

How to Add F5 Application Delivery Services to OpenStack

Intelligent Layer 7 DoS and Brute Force Protection for Web Applications

Intelligent Traffic Management with the F5 BIG-IP Platform

Introduction to the Stream Control Transmission Protocol (SCTP): The next generation of the Transmission Control Protocol (TCP)

Key Considerations in Deploying an SSL Solution

New Lifting and Shifting Enterprise Apps to the Cloud: 5 Rules to Follow (and 1 to Break)

Managing the Cloud with BIG-IQ Cloud

Maximizing Data Center Efficiency with F5 BIG-IP AAM

Meeting the Challenges of an HA Architecture for IBM WebSphere SIP

Myths of Bandwidth Optimization

Providing Security and Acceleration for Remote Users

Symmetric Optimization in the Cloud with BIG-IP AAM VE

Using Docker Container Technology with F5 Products and Services

Validating Microsoft Exchange 2010 on Cisco and NetApp FlexPod with the F5 BIG-IP System

vCenter Orchestrator Automates F5 BIG-IP Platform

Integrating the Cloud: Bridges, Brokers, and Gateways

Network Functions Virtualization – Everything Old Is New Again

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Application Delivery in the Cloud: Minimizing Disruption and Maximizing Control

Application Delivery Security: Integrated “Any App” Security

Applied Application Security- Positive & Negative Efficiency