5 past events found
Back to Search Begin New Search Save Search Auto-Notify
Splunk Workshop: Introduction to Machine Data
Machine-generated data is one of the fastest growing and complex areas of big data. It's also one of the most valuable, containing a definitive record of all user transactions, customer behavior, machine behavior, security threats, fraudulent activity, and more. Splunk turns machine data into valuable insights no matter what business you're in.Join Splunk and True Zero Technologies to learn how to collect and analyze machine data to gain criti...
February 13, 2020
Organizer: Splunk Government Team at Carahsoft
Location: North Charleston, SC
Add Favorite
F5 | Ansible Workshop
The name Ansible comes from a science fiction story. It was a technology that allowed the user to command and control all the starships in the galaxy. Do you want to command and control all the BIG-IPs in your galaxy? Organizations use Ansible automation tools to solve everyday automation challenges and achieve operational efficiency. Red Hat Ansible Tower helps customers scale IT automation, manage complex deployments, and increase productiv...
June 13, 2018
Organizer: F5 Networks Gov Team at Carahsoft Technology Corp.
Location: North Charleston, SC
Add Favorite
F5 SPAWAR Charleston TechTalk
Hosting workloads in an off-premise Cloud Service Offering (CSO) is becoming more prevalent in DoD. Taking advantage of cloud computing efficiencies is necessary when trying to keep up with an agile application deployment approach to IT. When utilizing these cloud compute resources, applying access control, monitoring, security and visibility as we do to our on-premise workloads is paramount in protecting the Mission Owner's applications and...
June 12, 2018
Organizer: F5 Networks Gov Team at Carahsoft Technology Corp.
Location: North Charleston, SC
Add Favorite
F5 Gov TechTalk - Charleston
Traditional firewalls (Layer 3-4) are purpose built to prevent external access to internal network resources, but these traditional firewalls offer little to no application layer protection. Threat vectors exist today at all layers of the network. Slowloris and HTTP flood attacks are examples of layer 7 attacks which would be undetected by most network firewalls. The impact of these undetected layer 7 attacks is the disruption of your mission...
November 14, 2017
Organizer: F5 Government Team at Carahsoft Technology Corp
Location: North Charleston, SC
Add Favorite
Current Issues in Storm Water Regulatio...
Save money by avoiding costly mistakes in storm water management. From recent litigation to changing permitting standards, failing to stay on top of current issues related to storm water regulation is risky. In this seminar, you will get answers to all your questions, such as: What new case and policy decisions impact my practices? What are the latest trends in the water quality arena? Here is your chance to learn - in just one day - the fact...
March 25, 2014
Organizer: Lorman Education Services
Location: North Charleston, SC
Add Favorite
Back to Search Begin New Search