Friday, June 14, 2024
No menu items!

F5

Red Hat Ansible Automation Platform Now Available on Microsoft Azure

Red Hat, a provider of open source solutions, announced on Tuesday that the Red Hat Ansible Automation Platform is now available on Microsoft Azure. Supported by Red Hat and Microsoft, Red Hat Ansible Automation Platform on Azure enables IT...

F5 to Acquire Edge-as-a-Service Platform, Volterra

F5 Networks has announced it will acquire all issued and outstanding shares of privately held Volterra for approximately $440 million in cash and approximately $60 million in deferred consideration. With the addition of Volterra’s technology platform, F5 is creating an...

F5 Networks Acquires Shape Security

F5 Networks – a company that helps make apps operate faster, smarter and safer for the world’s largest businesses, service providers, governments and consumer brands - has completed its acquisition of Shape Security, a leader in fraud and abuse...

What makes a WAF ‘advanced’?

While traditional web application firewalls (WAF) may have once been highly effective in mitigating application layer attacks, this type of solution now has trouble keeping up with the advanced capabilities and agility of attackers. This is according to an F5...

Global WAF report underscores F5 as key player in web application firewall security

F5’s position as a dominant player in the Web Application Firewall (WAF) market has been underscored by its participation in ‘Global Web Application Firewall Market Research Report 2017 to 2022’, which presents an in-depth assessment of the WAF market...

Where WAF fits into the data path

Web application firewalls (WAFs) are an integral component of application protection. They are excellent at protection against the OWASP (The Open Web Application Security Project) Top 10 and are a go-to solution for addressing zero-day vulnerabilities – but where...

Automate application deployments with F5 BIG-IP and Puppet

As businesses adopt digital transformation strategies to venture into new income streams as well as remain competitive, the need for speed remains a major driver in the crucial business differential of delivering great customer experiences quickly. However, as organisations adopt...

Discussing DDoS and the Ostrich Syndrome

The so-called Ostrich Syndrome is a term used to describe people who prefer to “stick their heads in the sand”, much as an ostrich does, rather than accept some uncomfortable facts. Sadly, when it comes to indisputable threats like Distributed...

Cloud and mobile will dominate the IT landscape

As an organisation that tracks developments in enterprise IT and assists thousands of companies around the world in tackling the challenges that these present, it is our business to be ahead of the game. In light of this, here...

F5 positioned in Leaders Quadrant

F5 Networks, represented locally by EnterWeb, an EOH company, has been positioned in the Leaders Quadrant of the 2009 Magic Quadrant for Application Delivery Controllers from Gartner. Gartner's Magic Quadrant for Application Delivery Controllers (ADC) evaluates key vendors in...
- Advertisement -spot_img

Latest News

Unpacking TECNO’s New SPARK 20P Smartphone: Available in SA

Having sufficient storage space on your smartphone is crucial in today's world, particularly with photos, videos, apps, and games...
- Advertisement -spot_img