Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Multi-Vendor

Managing F5 Deployments in Azure with HashiCorp Terraform Cloud


Event Date: August 13, 2020
Hosted By: F5 Networks, HashiCorp & Carahsoft
The rate at which new applications are being deployed is continuing to increase, with organizations often employing 10 or more application services to power them. This drives the need for organizational visibility and enhanced collaboration among network, security, ops teams, and even developers to build and roll out applications securely and at speed.

To deploy platform independent application services - that scale on demand without hindering deployment speeds - organizations need to implement a consistent way to both provision critical infrastructure and manage critical services while adhering to organizational policies. This is where F5 and HashiCorp come in.

In this webinar, we covered:
  • Managing and versioning F5 configurations in Terraform Cloud
  • Leveraging HashiCorp Sentinel policies for compliance and governance
  • Deploying and configuring F5 in Azure 

Fill out the form below to view this archived event.


Resources


Elastic Global Threat Report Vol.1 2022
Resources

Elastic Global Threat Report Vol.1 2022

In Elastic Security Labs' inaugural threat report, explore threat phenomena and trends, gleaning recommendations to help you prepare for the future of cybersecurity. Learn about the latest malware research, attack patterns, and clusters of malicious activity from a team of seasoned threat researchers working with a broad set of telemetry data.

From this threat report, you'll come away with an understanding of how to prevent cybersecurity threats through visibility, capability, and expertise — all while joining Elastic in its mission to normalize an open approach to security. Key highlights you don’t want to miss:

  • Nearly 41% of credential access alerts attempted to steal application access tokens versus other credentialed materials
  • A combined 72% of all defense evasion techniques consisted of masquerading and system binary proxy execution
  • CobaltStrike was the most popular malicious binary or payload for Windows endpoints with ~35% of all detections

Fill out the form below to view this Resource.