AUTHORS

Articles by Jay Kelley

  • Share to Facebook
  • Share to X
  • Share to Linkedin
  • Share via AddThis
Published: Feb 26, 2021
In today’s fast-paced, what-have-you-done-for-me-lately world, changes in business must happen in the blink of an eye or have significant negative impact. For security solutions in particular, rapidly increasing capacity or quickly changing configurations can be driven by the need to add new applications or adapt existing ones, or by an immediate and massive influx of remote workers.
Published: Jan 28, 2021
With the level of encrypted traffic today, the need to ensure user and consumer data privacy, and the computationally intensive task of decryption and re-encryption, leveraging a traditional security solution to pull double-duty to deliver security by simply decrypting and re-encrypting traffic can be a very bad idea.
Published: Nov 16, 2020
Public cloud solutions offer a lot of well-known benefits, but they also pose the occasional challenge. For example, organizations are used to having precise control over all the network traffic in their data centers, and they count on that level of control to perform critical security checks. As corporate workloads move to the public cloud, IT operators are challenged to ensure that their security measures come along as well.
Published: May 18, 2020
Jay Kelley looks at how organizations are beginning to shift their technology concerns from application access and maintaining user productivity toward application security. The article also notes how cybercriminals are adapting and what you can do about it.
Published: May 13, 2020
Together, Azure Active Directory and BIG-IP APM offer unified security and user experience between modern and classic applications, providing a single identity control plane and delivering SSO from any device to all applications, whether they are hosted on-premises or in the cloud, and whether or not they support modern authentication and authorization.
Published: May 6, 2020
With the impacts of COVID-19, organizations need to ensure that their now home-based and remote employees are able to securely and seamlessly access the applications they need to be productive—especially with all the new challenges they’re facing every day. F5 BIG-IP APM and Azure Active Directory simplify the user experience for application access by enabling users to log in once and access all applications they have the right to access in any location.
Published: Apr 2, 2020
The COVID-19 pandemic has created a new work reality almost overnight. Globally, companies like F5 are finding new ways to reinforce flexibility and innovative collaboration as key elements of employee culture. In this article, Jay Kelley takes a closer look at the activities of the Technology Services team at F5 during the course of March 2020 to meet the changing needs of the company and its customers.
Published: Mar 13, 2020
F5 推出的 BIG-IP APM 能够帮助您和团队在 COVID-19 疫情期间保持高效和安全的居家或远程办公。
Published: Dec 9, 2019
“With great power comes great responsibility.” Acknowledging Voltaire and Churchill, the quote is best known from the Spider-Man comics, attributed to Uncle Ben. Of course, part of the line’s cultural prevalence is that it can be applied to any number of situations and topics, including TLS inspection.
Published: Dec 14, 2018
Coupled with Cisco Firepower series’ threat mitigation and performance capabilities, SSL Orchestrator performs the computationally heavy workload of decrypting traffic before distributing it to other devices in a security stack, so those same security devices are now able to cost-effectively scale.
Published: Oct 12, 2016
The latest from F5's Jay Kelley includes a list of considerations when deploying a new identity and access solution for Microsoft Office 365.
Published: Sep 21, 2016
A look at one of the most popular business productivity software suites ever, the keys to its longevity, and some of its challenges.
Published: Jun 7, 2016
Introducing F5’s BIG-IP 10350v-F platform, a FIPS 140-2 Level 3 supported implementation of the latest generation HSM delivering leading SSL bulk crypto performance, and superior price/performance ratio.
Published: Mar 3, 2016
Companies of all sizes are bombarded daily by network attacks and breaches. One of the most basic, yet effective network attacks against organizations and their applications are distributed denial of service (DDoS) attacks. The onslaught of these enterprise-aimed attacks has even the most security conscious organizations questioning their application defenses.