F5 Recent End-of-Life Announcements: Upgrade to BIG-IP iSeries RecommendedView F5 EOL Products




Burdine and Glidewell of ADAPTURE Recognized on CRN’s 2017 Women of the Channel

 ATLANTA, May 15, 2017 – ADAPTURE, an Atlanta-based IT consulting company and technology integrator, announced today that CRN®, a brand of The Channel Company, has named Laura Burdine, Sales Operations Manager, and Mandy Glidewell, Director of Marketing, to its prestigious 2017 Women of the Channel list. The women who comprise this annual list span the […]

May 12th, 2017|Categories: News & Press|

ADAPTURE named to 2017 Atlanta Business Chronicle Pacesetters List

Rising IT security and cloud consulting company lauded for explosive growth

ATLANTA, Apr 27, 2017—The Atlanta Business Chronicle formally recognized ADAPTURE as a “Pacesetter” Thursday morning during an awards breakfast held at Flourish in Buckhead. ADAPTURE ranks 44th out of 100 on the exclusive list, which recognizes the fastest growing private companies in Atlanta. To qualify […]

April 27th, 2017|Categories: News & Press|

ADAPTURE Named to CRN® 2017 Tech Elite 250 List

List recognizes IT solution providers with deep technical expertise and premier certifications

ATLANTA, March 27, 2017 – CRN®, a brand of The Channel Company, has named ADAPTURE to its 2017 Tech Elite 250 list. This annual list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical […]

March 27th, 2017|Categories: News & Press|

The Cost Savings and Business Benefits of Deploying Cylance

A Summary of Forrester Consulting’s Research Findings
Using Cylance’s security solutions reduces the risk of security breaches and improves IT and security employees’ productivity, according to a study conducted by Forrester Consulting.

Advanced threat protection provider Cylance commissioned Forrester Consulting to conduct a Total Economic Impact study and examine the potential return on investment enterprises could realize […]

March 21st, 2017|Categories: Cybersecurity, Security|

From the Experts: F5 Herculon Part 2 – DDoS Hybrid Defender

Written by Tim Cullen, CISSP, F5-CTS
Senior Security Architect at ADAPTURE

Many of our clients have expressed interest in learning more about the latest F5 offering: F5 iSeries. I gave a high-level overview of the new product line in a recent post, and reviewed the associated solution F5 Herculon: SSL Orchestrator in Part 1 of this series. […]

March 3rd, 2017|Categories: Cloud Security, DDoS, Security|

From the Experts: F5 Herculon Part 1 – SSL Orchestrator

Written by Tim Cullen, CISSP, F5-CTS
Senior Security Architect at ADAPTURE

In our recent post about the new F5 iSeries line of products, we discussed some of the hardware changes and performance increases the iSeries boasts. I wanted to take this conversation a step further and discuss how to fully utilize that hardware with a software solution […]

March 3rd, 2017|Categories: Cloud Security, Security, SSL|

What’s Next in Wireless Technology?

Written by Andy Thompson
Senior Solutions Architect at ADAPTURE

What’s the next wave in wireless?
I am going to introduce this topic by discussing 802.11ac Wave 2, as I believe this is a foundation for many of the new and exciting technologies that may soon hit the market. Even though AC Wave 2 may not be a new technology, it […]

March 3rd, 2017|Categories: Infrastructure, Networking|

The Cloudbleed Incident: Finally, Some Good News

Written by Elliott Abraham, CISSP
Senior Security Architect at ADAPTURE

There is a serious new internet bug in the news, and it even has one of those sinister sounding names. This bug, dubbed “Cloudbleed” by the security researcher who discovered it, is named in part because of its similarity to the Heartbleed bug, which infected more than […]

March 1st, 2017|Categories: Cloud, Cloud Security, Cybersecurity, Security|

3 Signs You’re Not Taking the Threat of Ransomware Seriously Enough

Written by Elliott Abraham, CISSP
Senior Security Architect at ADAPTURE

Ransomware represents the convergence of malicious intent and the hope for financial gain among the new tactics and motives of threat actors. Tactically speaking, ransomware continues to leverage existing malware as a method of infecting end user systems with the new, somewhat sinister, twist of preventing users […]

February 27th, 2017|Categories: Security|

Technical Breakdown: F5 Ticketbleed Remediation

Written by Tim Cullen, CISSP, F5-CTS
Senior Security Architect at ADAPTURE

In late October, a vulnerability was discovered that affects all versions of F5 TMOS from versions 11.4 to 12.1. This was originally discovered by Filippo Valsorda of the Cloudflare Crypto Team. (You can read about how the vulnerability was detected by reading Filippo’s blog here). The vulnerability […]

February 14th, 2017|Categories: Uncategorized|
Load More Entries