Event Date: March 19, 2019 - March 20, 2019
Hosted By: F5 Networks & Carahsoft
Location: McLean, VA
Government agencies face a variety of choices when deploying and managing their applications. The movement to meet government Cloud First Mandates coupled with increasing application threats to enterprise security are driving new complexities. These require thought around Authentication, Identity Management, Security and Agility of Application deployments, and how these should be tied to applications, wherever they sit in a multi-cloud and hybrid environment. New application development models require new policies for government stakeholders to deploy enterprise wide applications securely and rapidly in any environment.
Attend F5 Federal’s Government Technology Symposium to learn both about the risks of operating ‘as is’ and how to protect your agency leveraging F5 infrastructure. Agenda will include thought leadership on why you need to develop an Enterprise Application Policy, as well as practical F5 certification training, which will address the latest security risks as you bring development, operations, and security groups under one vision to reduce complexity and increase speed.
Keynote Presentation: Hear from Kara Sprague, Senior Vice President and General Manager at F5 Networks, on Application Capital and the need for Enterprise Application Policy. Why only managing your "most important" applications can lead to disaster.
The Symposium will also offer 2 specific certification tracks for F5 customerslooking to become an F5 certified administrator, culminating in free on-site certification testing on Thursday, March 21, 2019! There will be a separate track for F5 partners and any government employees interested in a deeper dive into some of the more common use cases that our customers are demanding of technology professionals.
On day 3 of the Symposium, Thursday, March 21st, attendees will have the opportunity to take an F5 certification exam. If you are interested in taking advantage of this complimentary offering, register and someone from our team will reach out with further information.
(ISC)2 CPE Credits
Attendees are eligible to receive CPE credits through (ISC)2. Make sure to register and fill in your (ISC)2 certificate number to qualify.
Justify Your Trip We’re developing some great content for this event and would love to see you attend – please use our drafted letter to justify travel and engineering credits for your trip!
BIG-IP® Access Policy
Manager® (APM) is a flexible, high-performance access and security solution
that provides unified global access to your applications and network. By
converging and consolidating remote access, LAN access, and wireless
connections within a single management interface and p...
F5® BIG-IP® Global Traffic
Manager™ (GTM) distributes DNS and user application requests based on business
policies, data center and network conditions, user location, and application
performance. BIG-IP GTM delivers F5’s high-performance DNS Services with
visibility, reporting, and analysi...
F5® BIG-IP® Local Traffic
Manager™ (LTM) helps you deliver your applications to your users, in a
reliable, secure, and optimized way. You get the extensibility and flexibility
of application services with the programmability you need to manage your
physical, virtual, and cloud infrastructure...
Application Security Manager™ (ASM)
is a flexible web application firewall that secures web applications in
traditional, virtual, and private cloud environments. BIG-IP ASM helps secure
applications against unknown vulnerabilities and enables compliance for key
F5® Silverline™ Web Application Firewall is a cloud-based service built on BIG-IP® Application Security Manager™ (ASM) – with 24x7x365 support from highly specialized security experts to help organizations protect web applications and data, and enable compliance with industry security standa...
A staple of organizations worldwide, Microsoft Office has long been one of the most popular business productivity software suites. Cloud-based Office 365, Microsoft's subscription-based access to its well-known applications, has been adopted by organizations of all sizes to increase user productivit...
With predictions of 30–50 billion Internet-connected devices by 2020, the need to provide end-to-end
encryption in a secure and scalable manner is critical for the protection of next-generation data centers
Federal IT organizations have never faced more difficult challenges: cyber attacks,
the mobile revolution, data center consolidation, cloud deployments, complex
application environments, and constantly increasing network traffic. And, at the
heart of it all, budget constraints demanding smart, af...