Welcome!

@DXWorldExpo Authors: Zakia Bouachraoui, Yeshim Deniz, Liz McMillan, Elizabeth White, Pat Romanski

Related Topics: @DXWorldExpo, @CloudExpo, @ThingsExpo

@DXWorldExpo: Article

Supersizing Application Access Services

Supersized Software Defined Application Services Based on 'Internet of Things' Growth

F5 Synthesis: Supersizing Application Access Services

#SDAS #IAM #IoT #Mobile The new requirements for app delivery include a focus on hyperscaling access to applications.

A plurality (48%) of enterprises deliver between 1 and 500 applications to consumers and employees. A somewhat surprising 21% deliver more than 1000 applications every day*.

Consider, now, the possible combinations (or is it permutations, I always mix those two up) that can be formed along with the synthesis-logoincreasing number of devices/connections per consumer and employee (predicted to hit 5 per individual by 2017 by Cisco). Oh, and don't forget to consider the potential impact from the Internet of Things. Things that need access to applications and data controlled by corporate access policies.

As you've probably already surmised, traditional access control technology isn't going to scale well in the face of that many potential entry points into the organization. In many cases, even modern access control solutions aren't going to scale - operationally or technologically - to meet that kind of demand.

future-of-access

Application access must not only scale; it has to hyper scale if organizations are going to meet this particularly application delivery challenge.

Part of the reason for this need to hyperscale access is the need to govern both on-premise and off-premise (i.e. cloud) based applications. A recent survey from Intermedia found 89% of respondents "retained access (that is, a valid login and password) to at least one application from a former employer. They named nearly every major app you can think of: Basecamp, Shopify, Desk.com, Office 365, Google Apps, MailChimp, Wordpress, and many more." Modern application access strategies must be able to better control access to these types of applications as well as the traditional internal intranet, productivity and back-office applications.

Hyperscaling access is as much about reach as it is capacity, and it was a focus of recently enhanced services in our portfolio of Software Defined Application Services (SDAS).

Supersized Software Defined Application Services

With the latest update to BIG-IP we gained some significant supersizing for services. Driven by continued growth in mobility, cloud and recognizing the coming impact of the Internet of Things, we've enhanced our Access and Identity Services both to enable service hyperscale and better support cloud applications and mobile devices.

  • Hyperscale for the device explosion
    F5 Access and Identity services can provide up to 2 million access sessions, connecting more users through a single instance - physical or virtual - than any other solution.
  • Extend and secure single sign-on (SSO)
    F5 Access and Identity services can help alleviate potential bottlenecks caused by browser restrictions on SAML messages with SAML Artifact Binding and extends SSL support for forms which are automatically populated and submitted. This ensures the security of SSO, limits restrictions on SSO, and simplifies SSO for automatic forms.
  • Increase user productivity by extending device availability to remote desktops
    F5 Access and Identity services delivers near-ubiquitous access to MS RDP, increasing user remote access and productivity through support for new platforms (e.g. iOS, Android, Wyse zero clients), and non-Windows platforms (Mac OS, Linux) where only Java-based clients are currently supported. APM also enables access to newer MSRDP functionality, such as multi-monitor support, etc.
  • Simplify secure authentication while enhancing user experience
    F5 Access and Identity services enhance the user experience, decreases human error, and eases authentication and support headaches, by dynamically detecting installed RSA SecurID software tokens, and after prompting the user for their PIN, automatically retrieving the randomly generated passcodes, simplifying authentication. It also enables touch-less user access for Windows devices.
  • Streamline user workflow with cutting-edge SSO support
    F5 Access and Identity services are the only services to extend single sign-on (via SAML) to include client-based applications and other browser-less environments, including desktop applications and server code in web apps, by supporting SAML ECP profiles, enhancing user experience, simplifying user workflow, and increasing user productivity and usability. Many applications, including Microsoft Outlook, are adding support for ECP profiles.

But it's not just about Access and Identity services. One of the biggest impact of more connections and more devices and more applications is the need to locate them in the first place. Without DNS services, the rest is almost irrelevant. The first point of contact is always DNS and F5 ensures that not only is access and identity able to scale to meet the forthcoming challenges but so is DNS.

Already significantly supersized with its capacity to maintain 9.2 billion concurrent connections to apps, F5 ups the ante with a significant improvement to its core DNS response capability. Able to scale up to 40 M query responses per second (RPS), F5 Availability services can simultaneously fend off DNS DDoS, support new apps and services and prevent outages across your DNS infrastructure.

It is almost an axiom that in the enterprise, you can only add more applications and infrastructure, you never take away from what's already deployed. With every new technological shift has come an explosion of new applications that bring with them threats and challenges that must be addressed. Cloud, mobility and the Internet of Things are certainly proving this to be a truism, and it is increasingly the case that application access must be able to meet that challenge.

F5 Synthesis Software Defined Application Services ensure that F5 Access and Identity services are able to to that so you can deliver applications without constraints anywhere, any time, to anyone.

access and dns synthesis

Additional Resources:

* From the forthcoming F5 State of App Delivery 2014.

More Stories By Lori MacVittie

Lori MacVittie is responsible for education and evangelism of application services available across F5’s entire product suite. Her role includes authorship of technical materials and participation in a number of community-based forums and industry standards organizations, among other efforts. MacVittie has extensive programming experience as an application architect, as well as network and systems development and administration expertise. Prior to joining F5, MacVittie was an award-winning Senior Technology Editor at Network Computing Magazine, where she conducted product research and evaluation focused on integration with application and network architectures, and authored articles on a variety of topics aimed at IT professionals. Her most recent area of focus included SOA-related products and architectures. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University.

DXWorldEXPO Digital Transformation Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...