Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

f5-logo-rgb_transparent.png
F5

F5's Approach to Zero Trust


Event Date: December 12, 2024
Hosted By: F5 & Carahsoft
Attendees joined for an exclusive webinar where F5’s Director of Solution Engineering, Corey Marshall, discussed how F5 approaches Zero Trust within the DoD and how enhancing API security is critical.
 
During this webinar, the following topics were discussed:
  • F5's Approach to Zero Trust
    • User: Access controls, identity management, focusing on BIG-IP’s security and API Gateway for secure access
    • Device: Device security and verification through F5 solutions
    • Network: Network segmentation and the role of BIG-IP and NGINX in traffic routing and security
    • Application: Application protection using BIG-IP and NGINX, including app security, WAF, and scaling
    • Data: Encryption, data loss prevention, and how NGINX ensures secure data flow
    • Visibility & Analytics: Real-time monitoring via BIG-IP analytics and NGINX for traffic insights
    • Automation & Orchestration: Streamlining security with F5 automation, BIG-IP orchestration, and NGINX workload management
    • API Gateway and API Discovery: Integrated within the application and network pillars, focusing on how API Gateway enhances F5’s Zero Trust architecture across BIG-IP and NGINX
Attendees were given the opportunity to receive 1.0 CPE credit for participating in this session.

Resources


Enabling Secure Mission Success with Wickr RAM in Department of Defense Cloud One
Blog

Enabling Secure Mission Success with Wickr RAM in Department of Defense Cloud One

Cloud One Wickr RAM availability provides DOD personnel access to a purpose-built application that provides messaging, file transfer, location sharing, audio/video calling, and screen share capabilities over any network—on any device—without connecting to a virtual private network (VPN) for both government and personal devices.


Fill out the form below to view this Resource.