SlideShare a Scribd company logo
1 of 20
Catching up to the Cloud:The Network’s Rapidly Evolving Role In ITaaS VMworld Super Session
Is IT-as-a-Service a Good Idea? Our survey shows 43% say somewhat/extremely attractive Source: F5 survey of 538 Enterprise IT professionals, July 2011
The Shift to The Dynamic Data Center The static data center used to work Then came virtualization & cloud Then the era of applications Then traffic diversification And now IT is buckling …
Cloud Computer: IDG Global Cloud Study 88%: Cloud is a priority within next 18 months 70%: Security is critical for cloud 68%: High availability is key for cloud
The Shift to The Dynamic Data Center 64% of developers including video in apps 1,912 average web transactions per user per day 28% of developers use HTML5
Traffic Diversification Amazon: 100 billion objects stored in S3  Google: 5 billion API calls/day Facebook: 5 billion API calls/day npr: 1.1 billion API-delivered stories/month
How Far Along are You? Source: F5 survey of 538 Enterprise IT professionals, July 2011
When will IT-as-a-Service become common? Source: F5 survey of 538 Enterprise IT professionals, July 2011
Problem: Networks Aren’t Adaptable Enough New Security Hole High Cost To Scale Slow Performance Network Administrator Application Developer Applications Focus on Business Logic and Functionality Traditional Networks are Focused on Connectivity
How Do You Fix the Problem? Multiple Point Solutions More Bandwidth Network Administrator Application Developer Hire an Army of Developers? Add More Infrastructure?
How Automation Helps – Automated Policies Optimizing the network for specific applications takes weeks … and can be frustrating Automated application policies reduce process to hours Applies to applications, the network, cloud, etc.
Will Your Organization Achieve IT-as-a-Service? Our survey shows 43% say somewhat/extremely likely they will Source: F5 survey of 538 Enterprise IT professionals, July 2011
A Brave New World … Applications are complex, composite, distributed Workplace is mobile, non-PC endpoints abound Traffic is diversified Everything creates and consumes data
Applications Are Central The network used to manage applications In the future, applications will manage the network
IT Must Change Today you configure the network largely by hand Tomorrow, if you don’t change, you will drown Instead, build a dynamic data center And manage the manager
Dynamic Data Center Reconfigure dynamically Manage by policy, not device Context-aware policies ADC manages services
Application Control Plane Architecture 10-100x faster deployment of applications Reduces CapEx Reduces OpEx  Enhanced scalability Enhanced security
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS

More Related Content

What's hot

Webinar: The Death of Traditional Data Integration
Webinar: The Death of Traditional Data IntegrationWebinar: The Death of Traditional Data Integration
Webinar: The Death of Traditional Data IntegrationSnapLogic
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's nextDuffy Fron
 
Top 5 Mistakes You Don’t Want to Make When Moving to the Cloud
Top 5 Mistakes You Don’t Want to Make When Moving to the CloudTop 5 Mistakes You Don’t Want to Make When Moving to the Cloud
Top 5 Mistakes You Don’t Want to Make When Moving to the CloudInternap
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes MobileNetApp
 
The Future of Network Management
The Future of Network ManagementThe Future of Network Management
The Future of Network ManagementExtreme Networks
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyOneNeck
 
AWS DC Summit - Data Led Migration
AWS DC Summit - Data Led MigrationAWS DC Summit - Data Led Migration
AWS DC Summit - Data Led MigrationSandy Carter
 
NetApp at Gartner Symposium Show Guide
NetApp at Gartner Symposium Show GuideNetApp at Gartner Symposium Show Guide
NetApp at Gartner Symposium Show GuideNetAppUK
 
8 Gartner ITOSSS Takeaways
8 Gartner ITOSSS Takeaways8 Gartner ITOSSS Takeaways
8 Gartner ITOSSS TakeawaysOpsRamp
 
The New DevOps Designers: Cloud and The Big Rethink
The New DevOps Designers: Cloud and The Big RethinkThe New DevOps Designers: Cloud and The Big Rethink
The New DevOps Designers: Cloud and The Big RethinkJames Urquhart
 
BMC Sales kickoff 2016 keynote
BMC Sales kickoff 2016 keynoteBMC Sales kickoff 2016 keynote
BMC Sales kickoff 2016 keynoteJennifer Stern
 
Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030
Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030
Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030VMware Un:Think
 
How Data Saves Time
How Data Saves TimeHow Data Saves Time
How Data Saves TimeNetApp
 
Integra: Get Your Head in the Cloud (Infographic)
Integra: Get Your Head in the Cloud (Infographic)Integra: Get Your Head in the Cloud (Infographic)
Integra: Get Your Head in the Cloud (Infographic)Jessica Legg
 
Zvolv- IOT to Impact
Zvolv- IOT to ImpactZvolv- IOT to Impact
Zvolv- IOT to ImpactZestl
 
Cloud Computing Basics II
Cloud Computing Basics IICloud Computing Basics II
Cloud Computing Basics IIRightScale
 

What's hot (20)

Webinar: The Death of Traditional Data Integration
Webinar: The Death of Traditional Data IntegrationWebinar: The Death of Traditional Data Integration
Webinar: The Death of Traditional Data Integration
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
App Modernization
App ModernizationApp Modernization
App Modernization
 
Top 5 Mistakes You Don’t Want to Make When Moving to the Cloud
Top 5 Mistakes You Don’t Want to Make When Moving to the CloudTop 5 Mistakes You Don’t Want to Make When Moving to the Cloud
Top 5 Mistakes You Don’t Want to Make When Moving to the Cloud
 
Intent based network
Intent based networkIntent based network
Intent based network
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes Mobile
 
The Future of Network Management
The Future of Network ManagementThe Future of Network Management
The Future of Network Management
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning Strategy
 
AWS DC Summit - Data Led Migration
AWS DC Summit - Data Led MigrationAWS DC Summit - Data Led Migration
AWS DC Summit - Data Led Migration
 
NetApp at Gartner Symposium Show Guide
NetApp at Gartner Symposium Show GuideNetApp at Gartner Symposium Show Guide
NetApp at Gartner Symposium Show Guide
 
8 Gartner ITOSSS Takeaways
8 Gartner ITOSSS Takeaways8 Gartner ITOSSS Takeaways
8 Gartner ITOSSS Takeaways
 
The New DevOps Designers: Cloud and The Big Rethink
The New DevOps Designers: Cloud and The Big RethinkThe New DevOps Designers: Cloud and The Big Rethink
The New DevOps Designers: Cloud and The Big Rethink
 
Cloud 101
Cloud 101Cloud 101
Cloud 101
 
BMC Sales kickoff 2016 keynote
BMC Sales kickoff 2016 keynoteBMC Sales kickoff 2016 keynote
BMC Sales kickoff 2016 keynote
 
Datascience for startups
Datascience for startupsDatascience for startups
Datascience for startups
 
Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030
Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030
Un:Think Lightning Talk - The Fall of the Customer Datacenter by 2030
 
How Data Saves Time
How Data Saves TimeHow Data Saves Time
How Data Saves Time
 
Integra: Get Your Head in the Cloud (Infographic)
Integra: Get Your Head in the Cloud (Infographic)Integra: Get Your Head in the Cloud (Infographic)
Integra: Get Your Head in the Cloud (Infographic)
 
Zvolv- IOT to Impact
Zvolv- IOT to ImpactZvolv- IOT to Impact
Zvolv- IOT to Impact
 
Cloud Computing Basics II
Cloud Computing Basics IICloud Computing Basics II
Cloud Computing Basics II
 

Viewers also liked

Jpc 2015
Jpc 2015Jpc 2015
Jpc 2015Anil G
 
ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...
ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...
ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...Virtual ULI
 
LaunchPad presentation 09-22-10
LaunchPad presentation 09-22-10LaunchPad presentation 09-22-10
LaunchPad presentation 09-22-10Tom Daly
 
Congruent Angles.pdf
Congruent Angles.pdfCongruent Angles.pdf
Congruent Angles.pdfbwlomas
 
Erlang高级原理和应用
Erlang高级原理和应用Erlang高级原理和应用
Erlang高级原理和应用Feng Yu
 
Operation Logic Manager
Operation Logic ManagerOperation Logic Manager
Operation Logic ManagerLee Seungki
 

Viewers also liked (6)

Jpc 2015
Jpc 2015Jpc 2015
Jpc 2015
 
ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...
ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...
ULI in Action on Transportation and Infrastructure: A Catalyst for Sustainabl...
 
LaunchPad presentation 09-22-10
LaunchPad presentation 09-22-10LaunchPad presentation 09-22-10
LaunchPad presentation 09-22-10
 
Congruent Angles.pdf
Congruent Angles.pdfCongruent Angles.pdf
Congruent Angles.pdf
 
Erlang高级原理和应用
Erlang高级原理和应用Erlang高级原理和应用
Erlang高级原理和应用
 
Operation Logic Manager
Operation Logic ManagerOperation Logic Manager
Operation Logic Manager
 

Similar to F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS

Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Riverbed Technology
 
Aitp presentation ed holub - october 23 2010
Aitp presentation   ed holub - october 23 2010Aitp presentation   ed holub - october 23 2010
Aitp presentation ed holub - october 23 2010AITPHouston
 
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013MassTLC
 
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...QuickBase, Inc.
 
Why Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingWhy Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingTechSoup Global
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...IBM India Smarter Computing
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks Abaram Network Solutions
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeCapgemini
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devopsUlf Mattsson
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behindMatt Mandich
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud ComputingIMC Institute
 
Softchoice the changing world of it
Softchoice   the changing world of itSoftchoice   the changing world of it
Softchoice the changing world of itNadia Tsinokas
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?trentlivingston
 
Modernize your Infrastructure and Mobilize Your Data
Modernize your Infrastructure and Mobilize Your DataModernize your Infrastructure and Mobilize Your Data
Modernize your Infrastructure and Mobilize Your DataPrecisely
 
The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...Diego Alberto Tamayo
 

Similar to F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS (20)

Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?
 
Aitp presentation ed holub - october 23 2010
Aitp presentation   ed holub - october 23 2010Aitp presentation   ed holub - october 23 2010
Aitp presentation ed holub - october 23 2010
 
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
 
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
 
Why Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingWhy Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud Computing
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
 
Mis 2
Mis 2Mis 2
Mis 2
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud Computing
 
Softchoice the changing world of it
Softchoice   the changing world of itSoftchoice   the changing world of it
Softchoice the changing world of it
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
Modernize your Infrastructure and Mobilize Your Data
Modernize your Infrastructure and Mobilize Your DataModernize your Infrastructure and Mobilize Your Data
Modernize your Infrastructure and Mobilize Your Data
 
The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...
 

More from F5 Networks

Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesF5 Networks
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey ResultsF5 Networks
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 Networks
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionF5 Networks
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersF5 Networks
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...F5 Networks
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachF5 Networks
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Networks
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015F5 Networks
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Networks
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Networks
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)F5 Networks
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)F5 Networks
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)F5 Networks
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks
 

More from F5 Networks (20)

Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: Madness
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference Architecture
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS

  • 1. Catching up to the Cloud:The Network’s Rapidly Evolving Role In ITaaS VMworld Super Session
  • 2. Is IT-as-a-Service a Good Idea? Our survey shows 43% say somewhat/extremely attractive Source: F5 survey of 538 Enterprise IT professionals, July 2011
  • 3. The Shift to The Dynamic Data Center The static data center used to work Then came virtualization & cloud Then the era of applications Then traffic diversification And now IT is buckling …
  • 4. Cloud Computer: IDG Global Cloud Study 88%: Cloud is a priority within next 18 months 70%: Security is critical for cloud 68%: High availability is key for cloud
  • 5. The Shift to The Dynamic Data Center 64% of developers including video in apps 1,912 average web transactions per user per day 28% of developers use HTML5
  • 6. Traffic Diversification Amazon: 100 billion objects stored in S3 Google: 5 billion API calls/day Facebook: 5 billion API calls/day npr: 1.1 billion API-delivered stories/month
  • 7.
  • 8. How Far Along are You? Source: F5 survey of 538 Enterprise IT professionals, July 2011
  • 9. When will IT-as-a-Service become common? Source: F5 survey of 538 Enterprise IT professionals, July 2011
  • 10.
  • 11. Problem: Networks Aren’t Adaptable Enough New Security Hole High Cost To Scale Slow Performance Network Administrator Application Developer Applications Focus on Business Logic and Functionality Traditional Networks are Focused on Connectivity
  • 12. How Do You Fix the Problem? Multiple Point Solutions More Bandwidth Network Administrator Application Developer Hire an Army of Developers? Add More Infrastructure?
  • 13. How Automation Helps – Automated Policies Optimizing the network for specific applications takes weeks … and can be frustrating Automated application policies reduce process to hours Applies to applications, the network, cloud, etc.
  • 14. Will Your Organization Achieve IT-as-a-Service? Our survey shows 43% say somewhat/extremely likely they will Source: F5 survey of 538 Enterprise IT professionals, July 2011
  • 15. A Brave New World … Applications are complex, composite, distributed Workplace is mobile, non-PC endpoints abound Traffic is diversified Everything creates and consumes data
  • 16. Applications Are Central The network used to manage applications In the future, applications will manage the network
  • 17. IT Must Change Today you configure the network largely by hand Tomorrow, if you don’t change, you will drown Instead, build a dynamic data center And manage the manager
  • 18. Dynamic Data Center Reconfigure dynamically Manage by policy, not device Context-aware policies ADC manages services
  • 19. Application Control Plane Architecture 10-100x faster deployment of applications Reduces CapEx Reduces OpEx Enhanced scalability Enhanced security