Overview

Products

Solutions:

  • DDoS Protection
  • Application Services
  • Intelligent DNS Scale
  • Cloud Bursting
  • Cloud Migration
  • Security for Service Providers
  • LTE Roaming
  • Cloud Federation
  • S/Gi Network Simplification
  • Network Functions Virtualization
  • Next-Generation IPS
  • Secure Web Gateway
  • Web Fraud Protection
  • DevOps

Platforms:

  • BIG-IP
  • BIG-IQ

Modules:

  • Global Traffic Manager (GTM)
  • Local Traffic Manager (LTM)
  • Advanced Firewall Manager (AFW)
  • Access Policy Manager (APM)
  • Application Security Manager (ASM)
  • Application Acceleration Manager (AAM)
  • Secure Web Gateway Services (SWG)
  • WebSafe
  • Link Controller (LC)
  • IP Intelligence Services (IIS)
  • Enterprise Manager (EM)

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- June 17, 2017


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: June 17, 2017

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2017

F5 WSCA

Vendor: F5, Term: June 1, 2014 - May 31, 2019

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Florida - Palm Beach County

Through April 30, 2019

National Cooperative Purchasing Alliance (NCPA)

Term: through April 30, 2019

National Intergovernmental Purchasing Alliance (National IPA)

Term: through May 31, 2018 (with 2 option renewal years)

Ohio State Contract- 534354

Contract # 534354 Term: June 17, 2017

Oklahoma DIR Contract # SDD-2035

Vendors: Various Term: May 3, 2013 - May 3, 2017

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

State of New Mexico General Services Department Contract

Contract # 30-000-13-00060 Term: March 17, 2017

Texas DIR-SDD-2035

Term: May 3, 2017

VASCUPP

Contract Number: UVA1482501 Contract Term: May 2, 2014– June 17, 2017

VITA Contract

Term: through March 30, 2017


Events

Upcoming Events

March 29, 2017 at 11:00 AM EDT
March 29, 2017 at 11:00 AM EDT
March 29, 2017 at 8:00 AM EDT
April 05, 2017 at 11:30 AM EDT
April 11, 2017 at 8:00 AM EDT
April 12, 2017 at 8:00 AM EDT
April 18, 2017 at 11:00 AM EDT

Archived Events

News

Latest News

Carahsoft Technology Corp., the trusted government IT solutions provider, is pleased to host the 4th Annual F5 Government Technology Symposium. This day-long event is designed for government IT ...
READ MORE >
Carahsoft is pleased to host the 3rd Annual F5 Government Technology Symposium. Designed for government IT leaders and practitioners interested in learning new strategies for application delivery, ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, announced today that F5 Networks has named Carahsoft its UNITY Distributor of the Year for the Americas. This award, honoring ...
READ MORE >
F5 Networks and Carahsoft are hosting the 2nd annual F5 Government Technology Symposium. During this one-day government conference, attendees will hear how agencies are successfully implementing ...
READ MORE >
F5 Networks, Inc. (NASDAQ: FFIV), the global leader in Application Delivery Networking, today announced that its BIG-IP® version 11 software delivers end-to-end application access control to help ...
READ MORE >

Resources

BIG-IP® Access Policy Manager® (APM) is a flexible, high-performance access and security solution that provides unified global access to your applications and network. By converging and consolidating remote access, LAN access, and wireless connections within a single management interface and p...

BIG-IP® Access Policy Manager® (APM) is a flexible, high-performance access and security solution that provides unified global access to your applications and network. By converging and consolidating remote access, LAN access, and wireless connections within a single management interface and provi...

f5.png
Whitepaper
Emerging data center models are based on flexibility and non-disruptive, on-demand scalability. Infrastructure must not only support these capabilities, but must be able to provide these same benefits and capabilities to itself. F5 ScaleN is a breakthrough in high availability and scalabili...

F5® BIG-IP® Global Traffic Manager™ (GTM) distributes DNS and user application requests based on business policies, data center and network conditions, user location, and application performance. BIG-IP GTM delivers F5’s high-performance DNS Services with visibility, reporting, and anal...

A staple of organizations worldwide, Microsoft Office has long been one of the most popular business productivity software suites. Cloud-based Office 365, Microsoft's subscription-based access to its well-known applications, has been adopted by organizations of all sizes to increase user productivit...

Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave ...

BIG-IP® Application Security Manager™ (ASM) is a flexible web application firewall that secures web applications in traditional, virtual, and private cloud environments. BIG-IP ASM helps secure applications against unknown vulnerabilities and enables compliance for key regulatory mandates.

Complex infrastructure creates an App-Data Gap that disrupts delivery, impacting critical business processes. Closing the gap requires predicting and preventing all barriers to data velocity. With Nimble Predictive Flash Platform, the App-Data Gap closes by combining flash performance with InfoSight...

Private cloud—as an approach to IT operations—calls for organizations to transform their data centers, including the network. Using strategic points of control to aggregate and dynamically provision IT resources can help organizations meet network-related challenges and move past the...

Why do attackers target federal systems? They seek intelligence, advantage and political gain. The possibilities are endless: intelligence about an opponent’s military capabilities, movement of high-value individuals or national economic strategies; advantage by disabling or crippling sensors an...