F5 Networks and the Power of BIG-IP Version 12

A--F5 Networks and the Power of BIG-IP Version 12

What is HTTP/2 protocol? I’m sure you know what HTTP is, considering you always type that acronym on the address bar of your favorite browser. Well, boys and girls, HTTP is the foundation of data communications for the World Wide Web. It uses logical link or hyperlinks between the nodes that contain text; hence, HTTP is the protocol used to exchange or transfer hypertext, sort of like a request-response callout between a client-server model. Your favorite web browser may be the client and the app running on a hosted web site may be the server. Got it? Awesome!

One more bit of history before I move on. In 2012, Google started developing SPDY™ (pronounced speedy) as an open networking protocol that manipulates HTTP traffic, with the intent of reducing web page load latency and improving web security. SPDY™ actually led to the development of HTTP/2 standard and Google has recently announced withdrawing support for SPDY™ by this year. Most of the HTTP syntax remain; what HTTP/2 modified is how data is framed and transported between client and server.

HTTP/2 standardization was supported by Chrome, Opera, Firefox, Internet Explorer 11, Safari, Amazon Silk and Edge browsers. Most of these added HTTP/2 support by the end of last year. Today, seven percent of the top 10 million web sites support HTTP/2.

Which brings us to F5 Networks and their latest software release, BIG-IP® version 12.0, that is intended to improve the agility, security, and performance of cloud application deployments, and make it simpler for customers to unify hardware, software and managed service resources. Oh, and it supports the new HTTP/2 protocol. Hence, the long prose above about it.

Moving on, Oscar Visaya, Country Manager of F5 Networks in the Philippines, sent us a remark about their BIG-IP® release: “Organizations in the Philippines are ready for cloud/hybrid deployments, and they welcome innovations that help realize IT efficiency and cost savings. F5 is instrumental in helping customers take advantage of the benefits of the cloud without sacrificing security, flexibility or savings, in an evolving application delivery environment.”

Unifying hardware and software, including other managed services, allows you to transition workloads to cloud environments using the new HTTP/2 protocols without losing security, visibility and control of traditional infrastructures. BIG-IP® Virtual Edition will soon be available in the Azure Marketplace through F5 Networks’ Good, Better, Best licensing model.

Every enterprise wants secure authentication, authorization and accounting capabilities to cloud, web and virtual-based apps using single sign-on (SSO), a user or session authentication process that permits a user to enter one name and password in order to access multiple apps. Actually, F5 Networks is one of the leading vendors to extend SSO to client-based apps and browser-less environments such as Microsoft Office 365.

DDoS threats on-premise or in the cloud is an attack no company would want to venture into. BIG-IP® offers one of the best mitigations to protect your tech infrastructure from sophisticated, high-volume DDoS threats while providing simplified threat visibility and thorough drill-down summaries of attack details.

How about SSLs? That standard security technology for establishing an encrypted link between a web server and the browser is under scrutiny all the time. While many are moving towards an “encrypt everything” approach, BIG-IP® integrates SSL encryption and visibility so you can better manage security certificates across physical, virtual and cloud deployments without any loss in performance.

And for the highly bred security tech guru, there’s an entire page in F5 Networks’ web site dedicated to providing more information about the BIG-IP family of products, via https://f5.com/products/big-ip.

_

Source: Ardent Communications Press Release | SPDY™ | HTTP/2 | SSL

Images from F5.com.

Note: This is not a paid post.

_

Tags:, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Leave a Reply

Your email address will not be published. Required fields are marked *