f5

Think Forward.

  • byod

5 Things To Do Before You BYOD

The company-issued Blackberry died, and no one cared. According to a 2014 Webroot survey (PDF), 61% of companies support bring your own device (BYOD) or the use of employee-owned devices for company functions. Because we no longer control every device, how can we implement BYOD security to keep users and, perhaps more importantly, company data safe? BYOD Preparations [...]

2014-12-11T17:01:13-05:00December 11th, 2014|BYOD, Security|
  • f5 Cloud Security

Renting the Castle: F5 Cloud Security

Software is taking over the world. Have you heard that one before? The rise of public clouds like AWS and vCloud Air moves your data from your protected data center and into someone else’s domain. It’s one thing to protect your infrastructure if you own it, but what if you don’t? Cloud security requires a change in thinking. [...]

2014-12-02T17:34:13-05:00December 2nd, 2014|Cloud, Security|
  • Cloud Security in 7 Steps

Cloud Security in 7 Steps

We’ve talked about how the security breaches in 2014 can make IT security feel like a Hollywood slasher. Sticking together will help, but what about some practical tips for staying safe out there? Here's cloud security in 7 steps. 1. Protect more than the perimeter. Think about the number of people who have access to your network: employees, [...]

2014-11-14T17:28:45-05:00November 14th, 2014|Cloud, Security|
  • Cisco ACE Replacement

How to Survive Your First Cisco ACE Replacement

It’s been well over a year now since Cisco announced the end-of-life date for its 4710 Application Control Engine (ACE). In fact, come this January, you won’t be able to order a new ACE service contract at all. If you rely on ACE hardware for load balancing in your environment, the writing is on the wall, and it’s [...]

2014-09-22T17:12:02-04:00September 22nd, 2014|News & Press|
  • BYOD Policies

BYOD Policies to Prevent BYOD Threats

In this post: Learn about a rising trend in the workforce, BYOD, and how companies can institute effective BYOD policies. The Balancing Act: Flexibility or Security? The balancing act between freedom and control is not a new issue to people of the 21st century. We see this struggle daily in government, politics, and even with our children at [...]

2013-12-31T16:05:00-05:00December 31st, 2013|BYOD, Security|
Go to Top