探花视频

探花视频, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

Government Contracting for Dummies
Deltek Virtual Event

Event Date: December 11, 2025
Hosted By: Deltek & 探花视频
CMMC is here and most new Department of Defense/War contracts will have this requirement within. For CMMC Registered Practitioners (RPs), this significant milestone marks a pivotal shift from advisory preparation to operational execution and monumental opportunity to support assessment readiness for government ...
Government Contracting for Dummies
Deltek Virtual Event

Event Date: October 29, 2024
Hosted By: Deltek & 探花视频
Deltek's federal market experts, Carey Webster and Ashley Sanderson, led an insightful webinar on the top 20 highest-profile federal procurements for FY 2025. Attendees gained detailed intelligence on contract spending trends shaping the ...
If there was one thing agencies could do to improve the success of their projects, it would be to improve the quality of their project schedules. But this isn’t as easy as you’d think, as project schedules can be large, complex, change frequently, and often involve integrating multiple schedules to see the full ...

Resources


Application Flow Control & Securing your Apps with iRules
Presentation

Application Flow Control & Securing your Apps with iRules

F5 and 探花视频 attended the F5 DoD Virtual User Group (VUG). Security vulnerabilities are on the rise. In 2022, over 23,000 new CVEs have been published, a more than 300% increase over 5 years, and the number of knowncritical vulnerabilities is so large that application security teams simply cannot patch quickly enough. In this lab, we covered how F5 iRules can often 鈥渇ix鈥 things that are missing or hard to solve in the existing application stack. Of course, custom code should never take the place of a good security product, but arguably there鈥檚 no single security device that can address every vulnerability; and malware and other exploits generally move faster than software updates and patches. F5 iRules give you the power and flexibility to fill those gaps, and these labs provide just a taste of some of that power. In the following, you鈥檒l see a handful of ways to use iRules to defend and protect against malicious activity in your enterprise.

In this VUG, attendees learned how to utilize F5 Application Flow Control with iRules and get an intro to iRules LX. The following topics covered were:

  • How to create an iRule that Parses the URI to Route Traffic
  • Log and Change Headers
  • HTTP to HTTPS Redirect
  • Stream Profile
  • HTTP Payload Manipulation
  • iRules Summary / Events / HTTP(S)
  • SSL::profile

Fill out the form below to view this Resource.