Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

f5-logo-rgb_transparent.png
Multi-Vendor

F5 | Red Hat Tech on Tap


Event Date: October 16, 2024
Hosted By: F5, Red Hat & Carahsoft
Location: Montgomery, AL

Featured Speakers:

David Thomas, DISA Major Account Manager, F5

Peter Scheffler, Cybersecurity Solutions Architect, F5

Tim Ryan, Senior Account SA, Red Hat

Lee Armbuster, DoD Automation Specialist, Red Hat

Application and API security are rapidly evolving. Faced with new challenges that span traditional on-premise data centers, distributed multi-cloud environments, and legacy versus modern application deployments, the DoD requires flexible solutions to rapidly address a surging attack vector and an expanding threat landscape.

On this Tech on Tap tour stop, we focused on these new security threats and provided you with real-world examples of some recent attacks. These attacks showed how hackers were able to take advantage of this new digital landscape, exploiting API blind spots and exposing new vulnerabilities. We also discussed how these attacks were mitigated with the world's first holistic App and API security offering.

Our F5 and Red Hat experts provided guidelines on:

  • Automating security, networking, and application lifecycle processes
  • Protecting apps and APIs from various threats with Advanced Web App Firewall and API protection (WAAP)
  • Guarding APIs from attempted breaches by threat actors
  • Defending against bot attacks, account takeover, denial of service, and more
  • Delivering multi-layered protection against attacks using DDoS mitigation
  • Real-world attack mitigation with F5 Distributed Cloud, BIG-IP Classic/Next, and NGINX App Protect
  • Shift-Left/Secure-Right to secure every API Lifecycle
  • Quickly responding to security events using Event-Driven Ansible
  • OpenShift virtualization to migrate your virtual machines to a modern, cost-effective platform on-prem or in the cloud

Fill out the form below to view this archived event.


Resources


Zerto Cyber Resiliency Vault
Datasheet

Zerto Cyber Resiliency Vault

The Zerto Cyber Resilience Vault offers full air gap protection through an isolated, disconnected vault with no internet access or connection to production infrastructure. It employs a zero-trust architecture designed to withstand severe cyber threats, including real-time encryption detection to provide early warnings of attacks. The vault ensures rapid recovery with Zerto's orchestration and automation combined with high-performance hardware from Hewlett Packard Enterprise (HPE), reducing recovery time objectives (RTOs) to mitigate ransomware effectively.


Download PDF