Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Logo-redhat-color-375.png
Red Hat

Red Hat at the Carahsoft DevSecOps Conference


Event Date: June 18, 2024
Hosted By: Carahsoft & Red Hat
Red Hat attended at the DevSecOps Conference on June 18th in Reston, Virginia. This year's event was even more exciting and insightful, with an agenda packed full of government panels, engaging sessions and thought-provoking discussions on the latest trends and challenges in DevSecOps. Attendees were able to participate in government panels, specialized sessions and demo sessions. Attendees were also given the opportunity to learn from government officials, systems integrators and industry thought-leaders.
 
To meet these challenges, agencies must embrace the digital future. This means openly and securely transforming people, processes, and technology. As a trusted partner in IT modernization, Red Hat meets you where you are to customize solutions and remove barriers to innovation so you can get to mission faster and deliver exceptional citizen services that are cost effective and compliant with government regulations.

Fill out the form below to view this archived event.


Resources


Application Flow Control & Securing your Apps with iRules
Presentation

Application Flow Control & Securing your Apps with iRules

F5 and Carahsoft attended the F5 DoD Virtual User Group (VUG). Security vulnerabilities are on the rise. In 2022, over 23,000 new CVEs have been published, a more than 300% increase over 5 years, and the number of knowncritical vulnerabilities is so large that application security teams simply cannot patch quickly enough. In this lab, we covered how F5 iRules can often “fix” things that are missing or hard to solve in the existing application stack. Of course, custom code should never take the place of a good security product, but arguably there’s no single security device that can address every vulnerability; and malware and other exploits generally move faster than software updates and patches. F5 iRules give you the power and flexibility to fill those gaps, and these labs provide just a taste of some of that power. In the following, you’ll see a handful of ways to use iRules to defend and protect against malicious activity in your enterprise.

In this VUG, attendees learned how to utilize F5 Application Flow Control with iRules and get an intro to iRules LX. The following topics covered were:

  • How to create an iRule that Parses the URI to Route Traffic
  • Log and Change Headers
  • HTTP to HTTPS Redirect
  • Stream Profile
  • HTTP Payload Manipulation
  • iRules Summary / Events / HTTP(S)
  • SSL::profile

Fill out the form below to view this Resource.