F5ers prepping the Oracle Open World booth prior to day 2.
Watch how to configure LDAPS Authentication on the BIG-IP Edge Gateway with BIG-IP LTM functionality.
In this Technology Demonstration, Peter Silva sits down with Jose Gonzalez, Sr. Product Development Manger, to show the Client Side Traffic Shaping feature on the BIG-IP Edge Gateway, part of the overall BIG-IP v10.1 release. First see how UDP traffic can overtake SMB traffic, then how to configure Traffic Shaping on the BIG-IP, and finally how SMB and UDP can co-exist together over the tunnel.
In this Technology Demonstration, Peter Silva visits again with Jose Gonzalez to show the new BIG-IP Edge Client, covering such features as Smart Connect, Location Awareness, Customization, Deployment, Settings and other insights.
The following video was created to show steps taken to enable WAN optimization of EqualLogic replication.
Watch how BIG-IP ASM v10.2 can prevent Cross-site request forgery. Shlomi Narkolayev demonstrates. See how a CSRF is first accomplished then blocked by ASM. The configuration of CSRF protection is literally a checkbox.
Watch how BIG-IP ASM v10.2 can prevent a Cross-site request forgery. Shlomi Narkolayev demonstrates how to accomplish a CSRF attack and then shows how BIG-IP ASM stops it in it's tracks.
Watch how First American Corporation was able to consolidate and virtualize their infrastructure with BIG-IP LTM, GTM and FirePass SSL VPN providing them with the flexibility & speed to market their business required. From 750 machines to just 75, Jake Seitz of the Enterprise Architecture group talks about how they achieved performance gains, faster log in times, better service and disaster recovery.
Watch how First American Corporation was able to consolidate and virtualize their infrastructure with BIG-IP LTM, GTM and FirePass SSL VPN providing them with the flexibility & speed to market their business required. From 750 machines to just 75, Jake Seitz of the Enterprise Architecture group talks about how they achieved performance gains, faster log in times, better service and disaster recovery
Claudia Kraus, EMEA Communications Manager, interviews Ralf Sydekum, Manager, Field Systems Engineering about application security, main hacker scenarios and how to secure applications. Distributed by OneLoad****
Thanks to everyone who came to visit us at GITEX this year! Distributed by OneLoad****
In today’s fast-moving, on-demand culture, users demand that their applications always work—and work fast—on any device. If organizations fail to meet these expectations, it has never been easier for customers to find alternatives. For IT departments or organizations to stay connected to their customers, they must meet user expectations with responsive, omni-channel applications that deliver new features seamlessly. Distributed by OneLoad****
Aggressive competition is forcing organizations to tighten budgets and extract more productivity from existing resources. But fluctuating demands on a leaner data center infrastructure bring a risk: tipping the scale from an acceptable user experience to catastrophic failure and service outage. Solving this quandary lies in abstracting the processing and application delivery requirements from the static, underlying infrastructure and enabling those requirements to span physical locations as demand dictates. Distributed by OneLoad****
Many organizations are realizing the benefits of adopting cloud-based services rather than deploying and maintaining in-house solutions. Software as a Service (SaaS) providers are able to deliver niche expertise in a cost effective, multi-tenancy environment via a ready-to-consume, subscription-based model. The benefits of the SaaS option, however often come at the cost of up-to-the-minute access control and reliable security policy enforcement. Distributed by OneLoad****
Cloud computing can help organizations provide better services while reducing costs and streamlining IT. Infrastructure as a Service (IaaS) providers are promising faster build and deployment times, quicker ROI, and more flexible payment terms compared to services deployed from private data centers, and many organizations are looking to capitalize on these benefits. When not deployed properly, however, IaaS can create management overhead, fail to deliver predictable user experiences, and result in a generally disappointing service. Distributed by OneLoad****