Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

IA-Logo-80-H-01.png
Identity Automation

Improving K-12 cybersecurity during the Covid-19 Pandemic and beyond


Event Date: January 21, 2021
Hosted By: Carahsoft & Identity Automation

Do you know what the number one risk is to a K-12 institution's cybersecurity posture and sensitive data? – Your own users!

The sudden shift to remote learning has put an even larger target on the back of K-12 education institutions. When it comes to data breaches, the most prevalent path in is through compromised credentials. For this reason, the traditional perimeter is no longer sufficient and districts must take an identity-centric approach to security.

Building a holistic cybersecurity program that is anchored on the backbone of the individual identity of every user attempting to access any resources is the best approach to keep your employee and student data secure and avoid interruptions to learning that malicious actors can cause. 

View this on-demand webinar to learn more about the following topics:

  • How to enable a secure and efficient remote user strategy
  • Identify-centric approach to security
  • Building a holistic cybersecurity program



Fill out the form below to view this archived event.


Resources


Application Flow Control & Securing your Apps with iRules
Presentation

Application Flow Control & Securing your Apps with iRules

F5 and Carahsoft attended the F5 DoD Virtual User Group (VUG). Security vulnerabilities are on the rise. In 2022, over 23,000 new CVEs have been published, a more than 300% increase over 5 years, and the number of knowncritical vulnerabilities is so large that application security teams simply cannot patch quickly enough. In this lab, we covered how F5 iRules can often “fix” things that are missing or hard to solve in the existing application stack. Of course, custom code should never take the place of a good security product, but arguably there’s no single security device that can address every vulnerability; and malware and other exploits generally move faster than software updates and patches. F5 iRules give you the power and flexibility to fill those gaps, and these labs provide just a taste of some of that power. In the following, you’ll see a handful of ways to use iRules to defend and protect against malicious activity in your enterprise.

In this VUG, attendees learned how to utilize F5 Application Flow Control with iRules and get an intro to iRules LX. The following topics covered were:

  • How to create an iRule that Parses the URI to Route Traffic
  • Log and Change Headers
  • HTTP to HTTPS Redirect
  • Stream Profile
  • HTTP Payload Manipulation
  • iRules Summary / Events / HTTP(S)
  • SSL::profile

Fill out the form below to view this Resource.