Why Advanced Application Threats Requir...
Join F5 for a Hands-On-Lab to hear about F5's Advanced Web Application Firewall (WAF), a new category of app protection that introduces unique capabilities to the WAF market. Web application attacks are the #1 source of data breaches. A WAF provides critical security controls to protect web apps. However, not all WAF solutions are made equally. While many can help an organization protect their apps from common and known threats, most are inade...
Ransomware Prevention
Join F5 Networks and Carahsoft for a hands-on lab to learn about one of the most significant cyber-threats to date: ransomware. Experts agree that a multi-faceted and holistic strategy is the best defense. We will discuss actionable steps you can take to identify, prevent, detect, respond, and recover from a ransomware attack. We will also discuss the three primary attack vectors used to deliver ransomware and how F5 solutions can be directly...
Application Threat Intelligence Webinar
"Threat Intelligence" is a complex process of finding ways to collect nefarious activity on the web, analyzing it, and sharing it. The types of data you get out of threat intelligence, in its most basic form, is information on attackers (or threat actors), their methods, and their targets.But why is this important? Because of the true timeline of an attack. Join F5 Networks and Carahsoft to learn how threat intelligence allows you to spy on a...
F5 DC Seminar Series
The pace at which applications are developed and deployed continues to accelerate, bringing tangible benefits to businesses and their customers. To keep up, businesses are looking to eliminate IT bottlenecks through models like DevOps to improve internal processes, and automation to speed up workflows. Ansible's simple network automation framework includes native support for both legacy and open network devices. This framework separates the A...
F5 | Ansible Workshop
The name Ansible comes from a science fiction story. It was a technology that allowed the user to command and control all the starships in the galaxy. Do you want to command and control all the BIG-IPs in your galaxy? Organizations use Ansible automation tools to solve everyday automation challenges and achieve operational efficiency. Red Hat Ansible Tower helps customers scale IT automation, manage complex deployments, and increase productiv...
F5 SPAWAR Charleston TechTalk
Hosting workloads in an off-premise Cloud Service Offering (CSO) is becoming more prevalent in DoD. Taking advantage of cloud computing efficiencies is necessary when trying to keep up with an agile application deployment approach to IT. When utilizing these cloud compute resources, applying access control, monitoring, security and visibility as we do to our on-premise workloads is paramount in protecting the Mission Owner's applications and...
F5 Peterson Certification Prep Course
Join F5 Networks and Carahsoft for the F5 BIG-IP Administrator certification prep course. During the meeting we will be covering all of the exam blueprint points for the F5 101 & 201 exams. These blueprint points are the basis for the exam content and can be found on the F5 certification page of our website. This class is not a guarantee of a passing score on the exam, but is simply meant to be a review of the content contained in the exam...
F5 Government Technology Symposium
Federal Agencies are under ever increasing pressure to meet the Cloud First mandate and still maintain their security and regulatory compliance postures. Complicating matters even further, the 2017 Verizon Data breach report highlighted that 62% of the breaches involved application level hacking, and 81% of the hacking incidents involved weak or stolen passwords. This evolving combination of attack vectors makes cloud based applications a part...
F5 TechTalk - Privileged User Work Grou...
Are your network administrators using strong authentication? The DoD Cybersecurity Discipline Implementation Plan's top priority line of effort is Strong Authentication for Privileged Users. Join F5 Networks for a complimentary TechTalk at the AFCEA Cyberspace Symposium where you will learn how your routers, switches, secure telephony administration interfaces, firewall, IDS/IPS, DLP administration interfaces, storage array interfaces, VDI, an...
Enabling Public Cloud Application Perfo...
As government agencies move application to the public cloud, they are faced with the challenge of application performance and security in cloud-hosted application delivery. Default application delivery software in public cloud offerings rarely provide the true features and security that agencies are used to from enterprise Application Delivery Controls (ADCs) and Web Application Firewalls (WAFs). By adding virtual enterprise ADCs or WAFs with...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.