F5 Recent End-of-Life Announcements: Upgrade to BIG-IP iSeries RecommendedView F5 EOL Products




ADAPTURE Named to CRN® 2017 Tech Elite 250 List

List recognizes IT solution providers with deep technical expertise and premier certifications

ATLANTA, March 27, 2017 – CRN®, a brand of The Channel Company, has named ADAPTURE to its 2017 Tech Elite 250 list. This annual list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical […]

March 27th, 2017|Categories: News & Press|

The Cost Savings and Business Benefits of Deploying Cylance

A Summary of Forrester Consulting’s Research Findings
Using Cylance’s security solutions reduces the risk of security breaches and improves IT and security employees’ productivity, according to a study conducted by Forrester Consulting.

Advanced threat protection provider Cylance commissioned Forrester Consulting to conduct a Total Economic Impact study and examine the potential return on investment enterprises could realize […]

March 21st, 2017|Categories: Cybersecurity, Security|

From the Experts: F5 Herculon Part 2 – DDoS Hybrid Defender

Written by Tim Cullen, CISSP, F5-CTS
Senior Security Architect at ADAPTURE

Many of our clients have expressed interest in learning more about the latest F5 offering: F5 iSeries. I gave a high-level overview of the new product line in a recent post, and reviewed the associated solution F5 Herculon: SSL Orchestrator in Part 1 of this series. […]

March 3rd, 2017|Categories: Cloud Security, DDoS, Security|

From the Experts: F5 Herculon Part 1 – SSL Orchestrator

Written by Tim Cullen, CISSP, F5-CTS
Senior Security Architect at ADAPTURE

In our recent post about the new F5 iSeries line of products, we discussed some of the hardware changes and performance increases the iSeries boasts. I wanted to take this conversation a step further and discuss how to fully utilize that hardware with a software solution […]

March 3rd, 2017|Categories: Cloud Security, Security, SSL|

What’s Next in Wireless Technology?

Written by Andy Thompson
Senior Solutions Architect at ADAPTURE

What’s the next wave in wireless?
I am going to introduce this topic by discussing 802.11ac Wave 2, as I believe this is a foundation for many of the new and exciting technologies that may soon hit the market. Even though AC Wave 2 may not be a new technology, it […]

March 3rd, 2017|Categories: Infrastructure, Networking|

The Cloudbleed Incident: Finally, Some Good News

Written by Elliott Abraham, CISSP
Senior Security Architect at ADAPTURE

There is a serious new internet bug in the news, and it even has one of those sinister sounding names. This bug, dubbed “Cloudbleed” by the security researcher who discovered it, is named in part because of its similarity to the Heartbleed bug, which infected more than […]

March 1st, 2017|Categories: Cloud, Cloud Security, Cybersecurity, Security|

3 Signs You’re Not Taking the Threat of Ransomware Seriously Enough

Written by Elliott Abraham, CISSP
Senior Security Architect at ADAPTURE

Ransomware represents the convergence of malicious intent and the hope for financial gain among the new tactics and motives of threat actors. Tactically speaking, ransomware continues to leverage existing malware as a method of infecting end user systems with the new, somewhat sinister, twist of preventing users […]

February 27th, 2017|Categories: Security|

Technical Breakdown: F5 Ticketbleed Remediation

Written by Tim Cullen, CISSP, F5-CTS
Senior Security Architect at ADAPTURE

In late October, a vulnerability was discovered that affects all versions of F5 TMOS from versions 11.4 to 12.1. This was originally discovered by Filippo Valsorda of the Cloudflare Crypto Team. (You can read about how the vulnerability was detected by reading Filippo’s blog here). The vulnerability […]

February 14th, 2017|Categories: Uncategorized|

Ask the Experts: F5 iSeries – What You Need to Know

Written by Tim Cullen, CISSP and F5-CTS
Senior Security Architect at ADAPTURE

A few months ago, I was suddenly aware of a “disturbance in the force.” (That’s my way of saying my inbox started blowing up). It was a product announcement from F5—they had launched the F5 iSeries product. I was intrigued, and many of my clients and […]

February 7th, 2017|Categories: Uncategorized|

From the Experts: Network Penetration Testing Best Practices and the Related Challenges

Taking a Best-Practices Approach to Penetration Testing
Written by: Elliott Abraham, CISSP – Senior Security Architect at ADAPTURE

Penetration Testing or, as it’s known somewhat euphemistically, PEN Testing is a vital component of an overall risk management program. PEN Testing is so vital and is taken so seriously that the Payment Card Industry (PCI) in March of 2015 […]

Load More Entries