Security Whitepapers


Sort by: Date | Company | Title


The DDoS Threat Spectrum
By F5 Networks | 14/7/2014
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Download this now


Mitigating DDoS Attacks
By F5 Networks | 14/7/2014
The most basic network attacks attempt to overwhelm a defensive device with sheer volumes of traffic. Sometimes these volumetric attacks are designed to overload the connections-per-second (CPS) capacity (e.g., the ramp-up rate). Learn how to mitigate DDoS attacks
Download this now


The Application Delivery Firewall Paradigm
By F5 Networks | 14/7/2014
The increasing sophistication, frequency, and diversity of today’s network attacks are overwhelming conventional stateful security devices at the edge of the data center. A new data center architecture based on application delivery firewall solutions will effectively combat modern attacks while providing significant CapEx savings.
Download this now


Simplifying Security for the Mobile Network
By F5 Networks | 14/7/2014
Communications service providers face an array of complex challenges, from network growth and increasing security threats to technology transitions. In the face of these challenges, CSPs still need to plan for growth. Find out how
Download this now


Secure Mobile Access to Corporate Applications
By F5 Networks | 13/7/2014
The way corporations operate around mobile devices is currently shifting—employees are starting to use their own devices for business purposes, rather than company-owned devices. With no direct control of the endpoints, IT departments have generally had to prohibit this or risk insecure access inside the firewall. But as more mobile devices appear on the corporate network, mobile device management has become a key IT initiative.
Download this now


A Simplified Application Acceleration Architecture
By F5 Networks | 13/7/2014
Most organisations want to improve web application performance for their users, but they can’t always justify the cost of implementing acceleration techniques.Fine out where to find a simple, low-risk, and low-cost acceleration solution that can significantly improve the end-user experience. Read more
Download this now


IDC Vendor Spotlight: Optimising Application Performance
By F5 Networks | 13/7/2014
This IDC Vendor Spotlight examines how enterprises and service providers can tap on next-generation application delivery solutions to increase the availability of applications to end users.
Download this now


MageMojo Boosts Security and Ensures Availability
By F5 Networks | 13/7/2014
Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline on Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.
Download this now


The F5 DDoS Protection Reference Architecture
By F5 Networks | 13/7/2014
A guide for security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
Download this now


Security 101
By F5 Networks | 11/7/2014
Security 101: Industry experts have long debated which is a better defense mechanism in defending against Internet based attacks: a web application firewall (WAF) or an intrusion detection or prevention system (IDS/IPS),we define the differences. Read More
Download this now