BROWSING: F5

Security among key drivers for 5G private networks adoption

F5 highlighted that adopting a zero-trust architecture is important in a private 5G environment Security is one of the main motivators for enterprises to adopt 5G private networks, according to Richard Lopez, senior strategic architect at F5. “The main motivators for enterprises to adopt 5G private...

Editorial Report: Securing the edge – where 5G meets the enterprise

With the rapid evolution of wireless communication technologies, 5G has emerged as a transformative force, particularly in enterprise settings where private networks at the edge are becoming increasingly prevalent.In this report, RCR Wireless News explore the critical considerations surrounding the security of 5G private networks...

Telkom Indonesia inks cybersecurity deal with F5

F5 and Telkom agreed to work together to provide comprehensive cybersecurity services to organizations in Indonesia Telkom Indonesia has signed a Memorandum of Understanding (MoU) with cybersecurity firm F5 with the main goal of collaborating on cybersecurity services and strengthen Telkom’s own security capabilities, the...

Telco Cloud & Edge Forum 2024 – Key Findings Report

Telecom carriers are at a crossroads in their transformation journey. They face challenges such as network disaggregation, cloud strategies and legacy system integration. However, amidst these challenges, new innovations including AI and APIs offer new avenues for growth.What does the future hold for telcos as they pivot...

Connecting network edges with a ‘balanced’ multi-cloud model

For F5, it’s not just about delivering these applications at the edge; it’s also crucial to secure them once they’re there According to F5’s Senior Solutions Engineering Manager Chas Lesley, prioritizing application location and delivery is “critically important” for multi-cloud interoperability. The smartphone made it...

Editorial Webinar: Securing the edge -where 5G meets the enterprise

As wireless communication technologies continue to advance at a rapid pace, the emergence of 5G has become a game-changer, especially in enterprise environments where edge-based private networks are on the rise.On April 24th, RCR Wireless News is joined by F5 and KPMG for an insightful webinar diving into the critical...

What is the role of CI/CD in cloud-native and edge environments?

In a more open and flexible network environment, the attack surface has been 'opened up' Emerging technologies like cloud, edge and AI represent serious opportunities for telcos when it comes to network performance, efficiency and potential new revenue streams; however, they also present a host...

Test and Measurement: Spirent, 5G OI Lab collaborate on private network performance

A bevy of partners including Spirent Communications and the 5G Open Innovation Lab worked together to spotlight a new private network solution that is aimed at making easier to deploy enterprise private mobile networks and assure their performance. The collab includes cloud application and...

F5, SoftBank collaborate to provide advanced MEC services in Japan

SoftBank began nationwide deployment of MEC for 5G SA (5G MEC) in May 2022   F5 announced collaboration with Japanese operator SoftBank, to provide advanced Multi-access Edge Computing (MEC) services in Japan and international markets. SoftBank began nationwide deployment of MEC for 5G SA (5G MEC) in...

Enterprise IoT Summit to showcase trends including security

New Gartner report calls lists IoT technologies 'that should be on every organization's radar' including security In a new report, Gartner Inc., an IT research and advisory firm, identifies 10 internet of things technologies it expects to broadly impact businesses in 2017 and 2018. Gartner...

Is concurrency being left behind in NFV deployment plans?

As telecom operators continue to transform their networks with NFV and SDN technology, F5 says concurrency needs must be included in the process On this week’s show, we have a featured interview with Misbah Mahmoodi, senior product marketing manager at F5, to discuss the need...

2016 Predictions: Mobile, cloud and IoT impact on security strategies

F5 Networks looks at the impact mobile, cloud and IoT will have on security strategies in 2016 Editor’s Note: With 2016 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new...

F5 White Paper: Ten Essentials for Securing LTE Networks

Third generation (3G) mobile telephony included built-in security from the handset through the service provider’s core network. Fourth generation (4G) long-term evolution (LTE) is an IP-based system and, as such, brings with it long standing IP-based security weaknesses. From the beginning, standards bodies for...

One Size Does Not Fit All for IoT

The mobile industry is betting big on the Internet of Things. Mobile network operators are looking to IoT to fuel their subscriber and revenue growth for many years to come. But since there aren’t many “people” out there who aren’t already connected, the next...

NFV/SDN Reality Check – Episode 11: The shifting service orchestration landscape

On this week's NFV/SDN Reality Check we spoke with Frank Yue, senior technical marketing manager at F5, to garner insight into the importance and challenges facing NFV service orchestration for telecom operators. This has become an important topic as telecom operators continue to look...

The Internet of Secure Things

By now you’ve heard the projections that the “Internet of Things” will have 20 billion “things” by the year 2020. Translating such a massive figure into reality can be daunting, but what does it really mean? Today the number of mobile devices alone already...

2015 Predictions: Mobility in 2015 and beyond

Wi-Fi/LTE integration, security, cloud set to impact mobility in 2015 Subscribers are using 4G LTE networks and consuming wireless data 14-times more than on non-4G networks, according to a recent Cisco Systems study. Today, a multitude of applications and devices are available to consume the...

White Paper: Implementing NFV: Tips and Traps

Network functions virtualization (NFV) has made remarkable progress on many fronts. This includes market acceptance, architecture definition and supporting specifications. As a result, the industry will very soon move into the commercialization phase, leveraging the many business and technical lessons learned in proof-of-concept (PoC)...

Reader Forum: Paying for roaming bit-by bit – the micropayment strategy

Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something meaningful to say to the wireless industry. We want to keep this as open as possible, but we maintain some editorial control...