探花视频

探花视频, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: September 09, 2021
Hosted By: F5 & 探花视频
The American Rescue Plan injects much-needed investment into our country鈥檚 infrastructure, including $350 billion in aid for states and localities. State IT officials have called this 鈥渁 huge opportunity,鈥 as the Department of the Treasury has authorized use of these funds for IT modernization, cybersecurity ...
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: July 28, 2021
Hosted By: F5 & 探花视频
The global pandemic has materially increased citizen engagement with government applications across federal, state, local, and education levels. In turn, it has also accelerated cyberattacks and opened up new opportunities for attackers to enrich themselves. This on-demand webinar addresses the why and ...
Logo-redhat-color-375.png
Multi-Vendor Virtual Event

Event Date: June 17, 2021
Hosted By: Red Hat, F5 & 探花视频
In today鈥檚 Kubernetes-based, modern application environments, security at the edge is not sufficient. The NGINX Ingress Operator is a fully supported lifecycle management solution for the NGINX Ingress Controller (for both NGINX Open Source and NGINX Plus) on the Red Hat OpenShift Container ...
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: June 10, 2021
Hosted By: F5, Shape & 探花视频
The challenge for many higher education institutions is balancing security with easy access for legitimate users. Unwanted or malicious automated traffic, like credential stuffing, make up anywhere from 50-90% of an average enterprise鈥檚 online and mobile traffic 鈥 resulting in account takeover. Most education ...
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: June 03, 2021
Hosted By: F5 & 探花视频
Government Agencies and Higher Education will always be attractive cyberattack targets, but how can you turn the tables on the attackers and their bots without major investment in time and resources? There is a way to keep your critical apps available that is secure, as well as cost-effective and practical, to operate and ...
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: May 13, 2021
Hosted By: F5 & 探花视频
Over 50% of organizations pursuing digital transformation are changing how they develop, deploy, and operate applications—in short, they're modernizing. But building modern apps is a significant lift and requires things like support for multi-cloud, automation, self-service workflows, app-centric visibility, ...
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: March 02, 2021
Hosted By: F5 & 探花视频
In this workshop, we reviewed NGINX Controller features, teaching you how to easily manage multiple NGINX Plus instances, configure load balancing and gateways, and set alerts based on the metrics collected by NGINX Controller. 
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: February 24, 2021
Hosted By: F5 & 探花视频
F5 brought together some of the most respected names for a discussion on Zero Trust Architecture - Scott Rose, Computer Scientist at NIST and co-author on NIST鈥檚 800-207 Zero Trust Architecture publication, Gerald Caron, Director of Enterprise Network and 17-year veteran of the Department of State, and Brandon Iske, ...
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: February 04, 2021
Hosted By: F5 & 探花视频
F5 has observed a huge increase in fraudsters targeting student application portals of educational institutions. These fraudsters apply for student applications in order to get access to .edu email accounts. This results in FAFSA fraud, ballooning software licensing costs, infrastructure issues, and requiring labor ...
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: January 20, 2021
Hosted By: F5 Networks & 探花视频
F5 and 探花视频 held a roundtable with Dan Woods, head of the Shape Security Intelligence Center and former CIA and FBI special agent, and facilitated a discussion with fellow security leaders.Topics included, but were not limited to:Separating fake users from real ...

Resources


No resources were found. Please try another search.