Bringing the adaptive apps vision to life An abstract image of a man controlling various IT applications from a single control panel.


A couple of months ago we introduced the concept of adaptive applications: business applications that behave more like living organisms than cold bits of code. These apps are equipped with application security and delivery technologies that protect and secure all points of vulnerability, expand and contract resources based on performance needs, detect problems, and proactively heal themselves.
About the author
Kara Sprague, Executive Vice President and General Manager, BIG-IP at F5.
There are several key areas that need to be addressed to bring this vision to life for both traditional and modern applications. We define traditional applications as those that have a monolithic, client-server, or three-tier architecture. In contrast, modern applications are architected as distributed cloud apps – or container-native services that interact via APIs.
Traditional apps remain a prominent application architecture for most organizations
Based on our research, 97% of organizations are still managing traditional applications, and 76% are managing both traditional and modern applications. This means that 21% of organizations continue to rely exclusively on traditional applications.
Developed over the last several decades to address the most important business requirements, traditional applications are typically enabling the most mission-critical processes within organizations. This includes mortgage loan processing systems, payment processing engines, hospital electronic health records, first-generation Software–as-a-Service (SaaS) platforms, retail inventory management systems, and service provider 3G and 4G mobile networks. In addition to the mission-critical role they play and the potential disruption to the business if they stop functioning, traditional applications are also generally difficult and expensive to change or refactor.
The reality is that many customer engagement front ends, which are commonly designed today using modern architectures, still rely on those traditional applications in the back end. Most of today’s digital experiences are a blend of older applications serving as the systems of record, and modern apps providing systems of engagement. This application logic, traditional and modern, is increasingly distributed across the on-premises data center, the public cloud, and the edge. And all of these elements come together at the end-user’s device or browser as a single digital experience.
One of the biggest opportunities with adaptive applications is to retrofit traditional apps and simplify their security and delivery for hybrid- and multi-cloud deployments.
Traditional applications tend to be brittle
A traditional app may have been developed using programming languages that are no longer widely known, for example Fortran or COBOL. Even when written in a more contemporary language, the skillsets and the people who wrote the application might well have retired or moved on, making it difficult to find experts in that space anymore.
Another factor creating brittleness is that application traffic patterns change over time. The requests going to the application, their frequency, protocols, and the nature of the actual packet itself are all changing. The infrastructure elements surrounding the application, such as the network switching and routing and compute or hypervisor technology, also change over time.
Security vulnerabilities and exposures also contribute to brittleness. Over the past two years, we’ve seen a 300% increase in application attacks, and older apps with well-known entry points and vulnerabilities can be easy targets for today’s sophisticated attackers.
Any brittleness issues could cause the application to perform sub-optimally or stop performing altogether. It just becomes fragile. If the application is still doing something critical for the business, it can’t just be decommissioned, and in many cases opening it up and performing the equivalent of heart surgery on it is not viable either.
Maximizing operational efficiency and minimizing cost of ownership
To protect an older app and get the most out of it, what’s needed is a flexible wrapper or scaffolding with application security and delivery technology that can solve the issues in the application itself.
F5’s BIG-IP iRules, for instance, can address traditional application issues that arise over time, like retrofitting an old building. By inserting highly programmable application cybersecurity and delivery technologies in the data path, customers can mitigate issues found in traditional applications. Updating traditional applications can be time-consuming, costly, and risky but adding an iRule is quick, cheap, and doesn’t require a hard-to-find or over-subscribed application developer.
Such scaffolding should include world-class application security to enable consistent policy and services across all environments, especially as companies move those traditional applications into a public cloud, or even to a multi-cloud deployment.
Wrapping application security and delivery technology around traditional apps provides a layer of protection that is most valuable when it is highly flexible. That flexibility takes the form of programmability and configurability and enables traffic steering and policies to prevent certain traffic streams from getting to the application itself. It can also perform additional functions—from load balancing and protocol translation (for example HTTP/2 to HTTP/1.1) to security capabilities such as application firewalls, distributed denial of service protection, and bot mitigation.
For maximum operational efficiency, organizations should be evaluating application security and delivery technologies as a suite to drive consistency across on-premises and public cloud. A “best-of-suite” approach becomes even more important to performance as traffic becomes more encrypted. If you separate those functions out across a number of virtual or physical appliances along the application data path, every device in that application data path is going to be unencrypting the traffic, applying some function to it, and then re-encrypting it, which is super inefficient. Standardizing and consolidating your app security and delivery functions into a single solution is not only good for your wallet, it’s also good for your application performance.
When it comes to running traditional applications as effectively and efficiently as possible, automation becomes increasingly important. Automating the application security and delivery functions that surround traditional apps is a great way to reduce the operational cost. This can be done through declarative APIs that have versioning and deploying centralized management solutions such as BIG-IQ.
Apps working to their potential
To make all this work together to its full potential, organizations need to ensure they’re running the latest versions with the latest capabilities. They should also make sure they have the highest quality, most secure code, and many of the most advanced value propositions are only accessible on later versions of BIG-IP. To benefit from the shielding around fragile traditional apps, it’s crucial not to let the application security and delivery technologies become as fragile as the traditional application itself.
In summary, traditional applications will continue to play a critical role in the application portfolio of most organizations for many years to come. The right application security and delivery technologies can ensure these applications continue to perform while also improving operational efficiency. Those application security and delivery technologies should work consistently across on-premises and public cloud environments and be highly programmable and configurable to provide as much flexibility as possible. They should also include advanced security capabilities to protect mission-critical applications against even the most sophisticated attacks.
A couple of months ago we introduced the concept of adaptive applications: business applications that behave more like living organisms than cold bits of code. These apps are equipped with application security and delivery technologies that protect and secure all points of vulnerability, expand and contract resources based on performance needs,…
Recent Posts
- Fortnite’s new season has heists, pickles, and Cowboy Bebop
- The best microSD cards in 2025
- I tried this new online AI agent, and I can’t believe how good Convergence AI’s Proxy 1.0 is at completing multiple online tasks simultaneously
- I cannot describe how strange Elon Musk’s CPAC appearance was
- Over a million clinical records exposed in data breach
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010