F5 Federal Tech Session
CANCELED
Please note: This event has been cancelled. Please join F5 Networks and our strategic Technology Partners, Venafi and FireEye, for an informative Tech Session. This will be an interactive, action packed session filled with subject matter experts, demos and labs. F5 SSL Visibility10:00AM - 11:00AMSearch engines promote TLS-based sites, governments and corporations mandate more secure communications, and browser vendors silently push updates t...
CDCA Defense Summit
The CDCA Defense Summit is one of the largest defense-focused events on the East Coast, bringing together more than 1,000 government and industry leaders to spark ideas, innovation and solutions to technology challenges. Presentations, demonstrations, and collaborative discussions include the full spectrum of defense technologies, with particular focus in the areas of C5ISR, information warfare and cyber security. The event will explore topics...
Secure Software Defined Data Center for...
The speed and pace of cyber threats by state and non-state actors are bombarding DoD network defenses and threatening to undermine the United States' technological military advantage. This ever-changing face of war has created the Cyberspace AOR, driving the need for an integrated security strategy between the physical and virtual battlefield. VMware is uniquely positioned to help the Navy accomplish its mission of cyber dominance in every the...
9th Annual National Small Business Cont...
Join us for the 9th Annual National Small Business Contracting Summit | Southeast Conference, presented jointly by The American Small Business Chamber of Commerce and the U.S. Women’s Chamber of Commerce, being held in Charleston, SC. This popular event boasts a robust agenda that includes: Increased focus on making sure small business federal contractors secure our fair share of federal contracting (taxpayer) dollarsAccess to federal a...
June 14, 2018
Organizer:
USWCC Location:
North Charleston, SC
F5 | Ansible Workshop
The name Ansible comes from a science fiction story. It was a technology that allowed the user to command and control all the starships in the galaxy. Do you want to command and control all the BIG-IPs in your galaxy? Organizations use Ansible automation tools to solve everyday automation challenges and achieve operational efficiency. Red Hat Ansible Tower helps customers scale IT automation, manage complex deployments, and increase productiv...
F5 Gov TechTalk - Charleston
Traditional firewalls (Layer 3-4) are purpose built to prevent external access to internal network resources, but these traditional firewalls offer little to no application layer protection. Threat vectors exist today at all layers of the network. Slowloris and HTTP flood attacks are examples of layer 7 attacks which would be undetected by most network firewalls. The impact of these undetected layer 7 attacks is the disruption of your mission...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.