Header Image
Protect Your Brand with F5 Networks
 
Wednesday, October 19, 2016
11:30am - 1:30pm
50 N. Cameron Street
Harrisburg, PA 17101
Modern attacks on organizations may generally be organized by type, into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. 

Taken together, the F5 BIG-IP portfolio of products provide effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools including:
  • Volumetric attacks 
  • Network and protocol based anomalies
  • Application layer visibility and security
Join us in discussing:
  • Demonstrations on SSL visibility and application layer security 
  • Malware / Fraud / Advanced Phishing Detection
  • Best practices for version upgrades 
This is grass-roots experience for network and security engineers, application owners, and management, where you have the opportunity to receive advice and connect with your peers. 

Regards,
Deric Brown
F5 Government Team at
Carahsoft Technology Corp. 
(703) 230-7564 (Direct)
(877) 95-F5GOV (Team)

carahsoft
 
 
 
© 2016 Carahsoft Technology Corp.
1860 Michael Faraday Drive, Suite 100
Reston, Virginia  20190
www.carahsoft.com
T: 703.871.8500  |  F: 703.871.8505