探花视频

探花视频, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Logo-redhat-color-375.png
Multi-Vendor

Buckeye State Innovation: Leading Tech Solutions for Columbus


Event Date: September 26, 2024
Hosted By: Dynatrace, F5, Red Hat & 探花视频
Location: Columbus, OH
Red Hat came to Columbus for a dynamic day of innovation and automation! Red Hat, Dynatrace and F5 showcased cutting-edge solutions designed to streamline operations and drive digital transformation.
 
Attendees gained insights into the future of IT automation and learned how these technologies can help your organization achieve efficiency and agility.
  • Red Hat’s robust open source solutions drive enterprise-level agility and scalability.
  • Dynatrace's powerful AI-driven monitoring and analytics that deliver insights into system performance and user experience.
  • The transformative potential of F5’s application delivery and security solutions, designed to optimize performance and enhance productivity.

Fill out the form below to view this archived event.


Resources


Application Flow Control & Securing your Apps with iRules
Presentation

Application Flow Control & Securing your Apps with iRules

F5 and 探花视频 attended the F5 DoD Virtual User Group (VUG). Security vulnerabilities are on the rise. In 2022, over 23,000 new CVEs have been published, a more than 300% increase over 5 years, and the number of knowncritical vulnerabilities is so large that application security teams simply cannot patch quickly enough. In this lab, we covered how F5 iRules can often 鈥渇ix鈥 things that are missing or hard to solve in the existing application stack. Of course, custom code should never take the place of a good security product, but arguably there鈥檚 no single security device that can address every vulnerability; and malware and other exploits generally move faster than software updates and patches. F5 iRules give you the power and flexibility to fill those gaps, and these labs provide just a taste of some of that power. In the following, you鈥檒l see a handful of ways to use iRules to defend and protect against malicious activity in your enterprise.

In this VUG, attendees learned how to utilize F5 Application Flow Control with iRules and get an intro to iRules LX. The following topics covered were:

  • How to create an iRule that Parses the URI to Route Traffic
  • Log and Change Headers
  • HTTP to HTTPS Redirect
  • Stream Profile
  • HTTP Payload Manipulation
  • iRules Summary / Events / HTTP(S)
  • SSL::profile

Fill out the form below to view this Resource.