SlideShare a Scribd company logo
1 of 20
Catching up to the Cloud:The Network’s Rapidly Evolving Role In ITaaS VMworld Super Session
Is IT-as-a-Service a Good Idea? Our survey shows 43% say somewhat/extremely attractive Source: F5 survey of 538 Enterprise IT professionals, July 2011
The Shift to The Dynamic Data Center The static data center used to work Then came virtualization & cloud Then the era of applications Then traffic diversification And now IT is buckling …
Cloud Computer: IDG Global Cloud Study 88%: Cloud is a priority within next 18 months 70%: Security is critical for cloud 68%: High availability is key for cloud
The Shift to The Dynamic Data Center 64% of developers including video in apps 1,912 average web transactions per user per day 28% of developers use HTML5
Traffic Diversification Amazon: 100 billion objects stored in S3  Google: 5 billion API calls/day Facebook: 5 billion API calls/day npr: 1.1 billion API-delivered stories/month
How Far Along are You? Source: F5 survey of 538 Enterprise IT professionals, July 2011
When will IT-as-a-Service become common? Source: F5 survey of 538 Enterprise IT professionals, July 2011
Problem: Networks Aren’t Adaptable Enough New Security Hole High Cost To Scale Slow Performance Network Administrator Application Developer Applications Focus on Business Logic and Functionality Traditional Networks are Focused on Connectivity
How Do You Fix the Problem? Multiple Point Solutions More Bandwidth Network Administrator Application Developer Hire an Army of Developers? Add More Infrastructure?
How Automation Helps – Automated Policies Optimizing the network for specific applications takes weeks … and can be frustrating Automated application policies reduce process to hours Applies to applications, the network, cloud, etc.
Will Your Organization Achieve IT-as-a-Service? Our survey shows 43% say somewhat/extremely likely they will Source: F5 survey of 538 Enterprise IT professionals, July 2011
A Brave New World … Applications are complex, composite, distributed Workplace is mobile, non-PC endpoints abound Traffic is diversified Everything creates and consumes data
Applications Are Central The network used to manage applications In the future, applications will manage the network
IT Must Change Today you configure the network largely by hand Tomorrow, if you don’t change, you will drown Instead, build a dynamic data center And manage the manager
Dynamic Data Center Reconfigure dynamically Manage by policy, not device Context-aware policies ADC manages services
Application Control Plane Architecture 10-100x faster deployment of applications Reduces CapEx Reduces OpEx  Enhanced scalability Enhanced security
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS

More Related Content

What's hot

Webinar: The Death of Traditional Data Integration
Webinar: The Death of Traditional Data IntegrationWebinar: The Death of Traditional Data Integration
Webinar: The Death of Traditional Data IntegrationSnapLogic
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's nextDuffy Fron
 
Top 5 Mistakes You Don’t Want to Make When Moving to the Cloud
Top 5 Mistakes You Don’t Want to Make When Moving to the CloudTop 5 Mistakes You Don’t Want to Make When Moving to the Cloud
Top 5 Mistakes You Don’t Want to Make When Moving to the CloudInternap
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes MobileNetApp
 
The Future of Network Management
The Future of Network ManagementThe Future of Network Management
The Future of Network ManagementExtreme Networks
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyOneNeck
 
AWS DC Summit - Data Led Migration
AWS DC Summit - Data Led MigrationAWS DC Summit - Data Led Migration
AWS DC Summit - Data Led MigrationSandy Carter
 
NetApp at Gartner Symposium Show Guide
NetApp at Gartner Symposium Show GuideNetApp at Gartner Symposium Show Guide
NetApp at Gartner Symposium Show GuideNetAppUK
 
8 Gartner ITOSSS Takeaways
8 Gartner ITOSSS Takeaways8 Gartner ITOSSS Takeaways
8 Gartner ITOSSS TakeawaysOpsRamp
 
The New DevOps Designers: Cloud and The Big Rethink
The New DevOps Designers: Cloud and The Big RethinkThe New DevOps Designers: Cloud and The Big Rethink
The New DevOps Designers: Cloud and The Big RethinkJames Urquhart
 
BMC Sales kickoff 2016 keynote
BMC Sales kickoff 2016 keynoteBMC Sales kickoff 2016 keynote
BMC Sales kickoff 2016 keynoteJennifer Stern
 
Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030
Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030
Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030VMware Un:Think
 
How Data Saves Time
How Data Saves TimeHow Data Saves Time
How Data Saves TimeNetApp
 
Integra: Get Your Head in the Cloud (Infographic)
Integra: Get Your Head in the Cloud (Infographic)Integra: Get Your Head in the Cloud (Infographic)
Integra: Get Your Head in the Cloud (Infographic)Jessica Legg
 
Zvolv- IOT to Impact
Zvolv- IOT to ImpactZvolv- IOT to Impact
Zvolv- IOT to ImpactZestl
 
Cloud Computing Basics II
Cloud Computing Basics IICloud Computing Basics II
Cloud Computing Basics IIRightScale
 

What's hot (20)

Webinar: The Death of Traditional Data Integration
Webinar: The Death of Traditional Data IntegrationWebinar: The Death of Traditional Data Integration
Webinar: The Death of Traditional Data Integration
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
App Modernization
App ModernizationApp Modernization
App Modernization
 
Top 5 Mistakes You Don’t Want to Make When Moving to the Cloud
Top 5 Mistakes You Don’t Want to Make When Moving to the CloudTop 5 Mistakes You Don’t Want to Make When Moving to the Cloud
Top 5 Mistakes You Don’t Want to Make When Moving to the Cloud
 
Intent based network
Intent based networkIntent based network
Intent based network
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes Mobile
 
The Future of Network Management
The Future of Network ManagementThe Future of Network Management
The Future of Network Management
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning Strategy
 
AWS DC Summit - Data Led Migration
AWS DC Summit - Data Led MigrationAWS DC Summit - Data Led Migration
AWS DC Summit - Data Led Migration
 
NetApp at Gartner Symposium Show Guide
NetApp at Gartner Symposium Show GuideNetApp at Gartner Symposium Show Guide
NetApp at Gartner Symposium Show Guide
 
8 Gartner ITOSSS Takeaways
8 Gartner ITOSSS Takeaways8 Gartner ITOSSS Takeaways
8 Gartner ITOSSS Takeaways
 
The New DevOps Designers: Cloud and The Big Rethink
The New DevOps Designers: Cloud and The Big RethinkThe New DevOps Designers: Cloud and The Big Rethink
The New DevOps Designers: Cloud and The Big Rethink
 
Cloud 101
Cloud 101Cloud 101
Cloud 101
 
BMC Sales kickoff 2016 keynote
BMC Sales kickoff 2016 keynoteBMC Sales kickoff 2016 keynote
BMC Sales kickoff 2016 keynote
 
Datascience for startups
Datascience for startupsDatascience for startups
Datascience for startups
 
Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030
Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030
Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030
 
How Data Saves Time
How Data Saves TimeHow Data Saves Time
How Data Saves Time
 
Integra: Get Your Head in the Cloud (Infographic)
Integra: Get Your Head in the Cloud (Infographic)Integra: Get Your Head in the Cloud (Infographic)
Integra: Get Your Head in the Cloud (Infographic)
 
Zvolv- IOT to Impact
Zvolv- IOT to ImpactZvolv- IOT to Impact
Zvolv- IOT to Impact
 
Cloud Computing Basics II
Cloud Computing Basics IICloud Computing Basics II
Cloud Computing Basics II
 

Viewers also liked

Jpc 2015
Jpc 2015Jpc 2015
Jpc 2015Anil G
 
ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...
ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...
ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...Virtual ULI
 
LaunchPad presentation 09-22-10
LaunchPad presentation 09-22-10LaunchPad presentation 09-22-10
LaunchPad presentation 09-22-10Tom Daly
 
Congruent Angles.pdf
Congruent Angles.pdfCongruent Angles.pdf
Congruent Angles.pdfbwlomas
 
Erlang高级原理和应用
Erlang高级原理和应用Erlang高级原理和应用
Erlang高级原理和应用Feng Yu
 
Operation Logic Manager
Operation Logic ManagerOperation Logic Manager
Operation Logic ManagerLee Seungki
 

Viewers also liked (6)

Jpc 2015
Jpc 2015Jpc 2015
Jpc 2015
 
ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...
ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...
ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...
 
LaunchPad presentation 09-22-10
LaunchPad presentation 09-22-10LaunchPad presentation 09-22-10
LaunchPad presentation 09-22-10
 
Congruent Angles.pdf
Congruent Angles.pdfCongruent Angles.pdf
Congruent Angles.pdf
 
Erlang高级原理和应用
Erlang高级原理和应用Erlang高级原理和应用
Erlang高级原理和应用
 
Operation Logic Manager
Operation Logic ManagerOperation Logic Manager
Operation Logic Manager
 

Similar to F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS

Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Riverbed Technology
 
Aitp presentation ed holub - october 23 2010
Aitp presentation   ed holub - october 23 2010Aitp presentation   ed holub - october 23 2010
Aitp presentation ed holub - october 23 2010AITPHouston
 
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013MassTLC
 
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...QuickBase, Inc.
 
Why Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingWhy Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingTechSoup Global
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...IBM India Smarter Computing
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks Abaram Network Solutions
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeCapgemini
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devopsUlf Mattsson
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behindMatt Mandich
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud ComputingIMC Institute
 
Softchoice the changing world of it
Softchoice   the changing world of itSoftchoice   the changing world of it
Softchoice the changing world of itNadia Tsinokas
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?trentlivingston
 
Modernize your Infrastructure and Mobilize Your Data
Modernize your Infrastructure and Mobilize Your DataModernize your Infrastructure and Mobilize Your Data
Modernize your Infrastructure and Mobilize Your DataPrecisely
 
The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...Diego Alberto Tamayo
 

Similar to F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS (20)

Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?
 
Aitp presentation ed holub - october 23 2010
Aitp presentation   ed holub - october 23 2010Aitp presentation   ed holub - october 23 2010
Aitp presentation ed holub - october 23 2010
 
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
 
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
 
Why Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingWhy Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud Computing
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
 
Mis 2
Mis 2Mis 2
Mis 2
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud Computing
 
Softchoice the changing world of it
Softchoice   the changing world of itSoftchoice   the changing world of it
Softchoice the changing world of it
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
Modernize your Infrastructure and Mobilize Your Data
Modernize your Infrastructure and Mobilize Your DataModernize your Infrastructure and Mobilize Your Data
Modernize your Infrastructure and Mobilize Your Data
 
The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...
 

More from F5 Networks

Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesF5 Networks
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey ResultsF5 Networks
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 Networks
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionF5 Networks
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersF5 Networks
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...F5 Networks
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachF5 Networks
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Networks
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015F5 Networks
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Networks
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Networks
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)F5 Networks
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)F5 Networks
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)F5 Networks
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks
 

More from F5 Networks (20)

Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: Madness
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference Architecture
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Recently uploaded (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS

  • 1. Catching up to the Cloud:The Network’s Rapidly Evolving Role In ITaaS VMworld Super Session
  • 2. Is IT-as-a-Service a Good Idea? Our survey shows 43% say somewhat/extremely attractive Source: F5 survey of 538 Enterprise IT professionals, July 2011
  • 3. The Shift to The Dynamic Data Center The static data center used to work Then came virtualization & cloud Then the era of applications Then traffic diversification And now IT is buckling …
  • 4. Cloud Computer: IDG Global Cloud Study 88%: Cloud is a priority within next 18 months 70%: Security is critical for cloud 68%: High availability is key for cloud
  • 5. The Shift to The Dynamic Data Center 64% of developers including video in apps 1,912 average web transactions per user per day 28% of developers use HTML5
  • 6. Traffic Diversification Amazon: 100 billion objects stored in S3 Google: 5 billion API calls/day Facebook: 5 billion API calls/day npr: 1.1 billion API-delivered stories/month
  • 7.
  • 8. How Far Along are You? Source: F5 survey of 538 Enterprise IT professionals, July 2011
  • 9. When will IT-as-a-Service become common? Source: F5 survey of 538 Enterprise IT professionals, July 2011
  • 10.
  • 11. Problem: Networks Aren’t Adaptable Enough New Security Hole High Cost To Scale Slow Performance Network Administrator Application Developer Applications Focus on Business Logic and Functionality Traditional Networks are Focused on Connectivity
  • 12. How Do You Fix the Problem? Multiple Point Solutions More Bandwidth Network Administrator Application Developer Hire an Army of Developers? Add More Infrastructure?
  • 13. How Automation Helps – Automated Policies Optimizing the network for specific applications takes weeks … and can be frustrating Automated application policies reduce process to hours Applies to applications, the network, cloud, etc.
  • 14. Will Your Organization Achieve IT-as-a-Service? Our survey shows 43% say somewhat/extremely likely they will Source: F5 survey of 538 Enterprise IT professionals, July 2011
  • 15. A Brave New World … Applications are complex, composite, distributed Workplace is mobile, non-PC endpoints abound Traffic is diversified Everything creates and consumes data
  • 16. Applications Are Central The network used to manage applications In the future, applications will manage the network
  • 17. IT Must Change Today you configure the network largely by hand Tomorrow, if you don’t change, you will drown Instead, build a dynamic data center And manage the manager
  • 18. Dynamic Data Center Reconfigure dynamically Manage by policy, not device Context-aware policies ADC manages services
  • 19. Application Control Plane Architecture 10-100x faster deployment of applications Reduces CapEx Reduces OpEx Enhanced scalability Enhanced security