Other events by F5 Government Team at Carahsoft Technology Corp:
F5 Gov TechTalk - Charleston
Traditional firewalls (Layer 3-4) are purpose built to prevent external access to internal network resources, but these traditional firewalls offer little to no application layer protection. Threat vectors exist today at all layers of the network. Slowloris and HTTP flood attacks are examples of layer 7 attacks which would be undetected by most network firewalls. The impact of these undetected layer 7 attacks is the disruption of your mission...
F5 Air Force Boot Camp
Join F5 Networks and Carahsoft for a complimentary F5 Air Force Boot Camp. Langley AFB F5 Training Agenda: Set Up and Licensing TMOS and Networking Basic LTM Components Load Balancing and Monitoring Profiles and Persistence Acceleration Technologies Security and SSL Offload iRules Support and Troubleshooting iApps Device Service Clusters (High Availability) *Registration begins at 7:30am. *A complimentary breakfast and lunch will be provided....
F5 Air Force Boot Camp
Join F5 Networks and Carahsoft for a complimentary F5 Air Force Boot Camp. Wright-Patt AFB F5 Training Agenda: Set Up and Licensing TMOS and Networking Basic LTM Components Load Balancing and Monitoring Profiles and Persistence Acceleration Technologies Security and SSL Offload iRules Support and Troubleshooting iApps Device Service Clusters (High Availability) *Registration begins at 7:30am. *A complimentary breakfast and lunch will be provid...
Exploring F5 Seminar Series - Washington, DC
Welcome to the Industrial Revolution! Join F5 Networks and Carahsoft for Session 2 of the Exploring F5 Seminar Series: Introduction to iWorkflow, iApps, and the Tenant Model.In Session 1 of the Exploring F5 Seminar Series we defined the framework for a variety of topics related to F5’s vision for cloud services and the new network perimeter. We broke those capabilities down into three main areas: Age of Enlightenment – Analytics a...
F5 Government Technology Symposium
Optimizing Applications Through Secure Cloud Adoption Federal agencies are under constant threat from both traditional and Nation State Actors. Compounding that threat is trying to secure applications outside of the traditional private data center perimeter. The ability to deliver applications securely to anyone, anywhere, at any time is complex, especially while balancing the need to meet Federal mandates like Cloud First and HSPD12. Join F5...
F5 DoD TechTalk - San Antionio
Join F5 Networks and ClearShark for a complimentary lunch and TechTalk on Tuesday, June 13th, 2017. The term multi-factor authentication is used widely in DoD. What is it and how can F5 fill this need? Kevin Hall from ClearShark will be demonstrating how Big-IP’s Access Policy Manager (APM) can fill this multi-factor authentication for a multi-vendor enterprise. With APM’s dynamic policy-driven application access control, you will...
F5 Tidewater Security TechTalk
Join Us in Virginia Beach for a Security TechTalk Timelessly known for its superior defense, Sparta was known as one of the greatest cities without walls to ever be defended. Its walls were its mobile and highly trained units called Spartans. Often outnumbered in battle, their defensive techniques stood the test of time during their reign.Over the past decade in IT we have watched our walls dissolve and become porous. Our perimeter has shifte...
F5 Army Boot Camp: Federal SE 101/201 C...
Join us for an F5 Federal SE Certification Boot Camp. During the training we will be covering all of the blueprint exam points for the F5 101 & 201 certification exams. These blueprint points are the basis for the exam content, and can be found on the F5 certification page of our website. This class is not a guarantee of a passing score on the exam, it is simply meant to be a review of the content contained in the exam.Every attendee shou...
F5 Tech on Tap: APM & Privileged Access...
Join F5 Networks and ClearShark for some Tech on Tap covering the topic of APM & Privileged Access Management. Specific points we will explore are: How multi-factor authentication is used widely in the DoD A demo of how Big-IP’s Access Policy Manager (APM) can fill two factor authentication for a multi-vendor enterprise How to use APM’s dynamic policy-driven application access control to increase security in both your client a...
F5 DoD TechTalk: Increase Security and...
Join F5 Networks and ClearShark for a complimentary lunch and TechTalk on Tuesday, April 25th, 2017. The term multi-factor authentication is used widely in DoD. What is it and how can F5 fill this need? Kevin Hall from ClearShark will be demonstrating how Big-IP's Access Policy Manager (APM) can fill this multi-factor authentication for a multi-vendor enterprise. With APM's dynamic policy-driven application access control, you will see how you...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.