Back to Search Begin New Search Save Search Auto-Notify
How the IRS Unlocked Data from Legacy A...
The ongoing pandemic has highlighted the criticality of many Federal and State agencies' ability to quickly and accurately share data outside of their organization. However, many agencies struggle to even share their data amongst the applications within their own portfolio. In this webinar, we will explore how the IRS was able to liberate vast amounts of data "locked up" in legacy applications - freeing it for use all across the agency and bey...
Add Favorite
5 Steps to Comprehensive Data and Threa...
Many state and local government entities face increasingly complex challenges when it comes to keeping important data secure. Today there are more users, devices, applications, and data outside the organizational datacenter than inside. This network inversion introduces new blind spots, leaving agencies vulnerable to a new crop of cloud-enabled and credential-based attacks. Please join Netskope for a webinar to discuss how Netskope has partner...
Add Favorite
Find the Malicious Code Hiding on Your...
80% of web pages contain at least one third party library security vulnerability. Script threats like web skimming, formjacking, and Magecart attacks can steal data from visitors to your website. Content from third party sources are increasingly becoming major attack vectors for script attacks, which take advantage of compromised web tools you need. Join Akamai and Carahsoft for a complimentary webinar on June 24th to learn how you and your ag...
Add Favorite
Protecting Your Network Infrastructure...
Webinar Series: Protecting Your Network Infrastructure with Automation, Visibility and Continuous Insight Infoblox, in collaboration with Empowered Networks, presents a three-part webinar series covering Infoblox's NetMRI capabilities, compliance, and configuration automation tasks. Register now for one or more of these upcoming sessions! Webinar 1: Thursday, April 9, 2020 | 11:00am ET; 8:00am PT NetMRI Basics: What is Infoblox NetMRI and How...
Add Favorite
Splunk ESI Contract and DoD
DoD has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to DoDHow to leverage the contractDon't miss out. Registe...
Add Favorite
Accelerate Your Time-to-Sight with CDP...
CDP Data Center is the industry's most powerful, comprehensive data management and analytics platform for on-premises IT environments. Powered by a 100% open source distribution that combines the best technologies from Cloudera and Hortonworks, CDP provides the foundation for extending your workloads to private cloud. By attending this live CPE webinar, you will: Learn how CDP Data Center innovates your data analytics core to deliver faster, r...
Add Favorite
Modernize Your On-Prem Datacenter with...
VMware Cloud Foundation brings together virtualized compute, storage, and networking into a unified cloud operating model that allows your organization to reduce costs while increasing agility, standardization, and intrinsic security. By combining consistent infrastructure, operations, and intrinsic security posture across the entire stack, VMware’s Cloud Operating Model serves as the easiest and most efficient way to deploy, update, and...
Add Favorite
Protecting Government and Corporate Sup...
Supply chain complexity is rising, and the public and private sectors are stronger together. The resulting approach is called cyber collective defense, and it's changing how businesses and the federal government protect their supply chains.Join IronNet Cybersecurity, Amazon Web Services (AWS), and Carahsoft on June 25th for an insightful webinar on how a collective defense strategy allows federal agencies to:Better understand their threat land...
Add Favorite
Moving to the Cloud with Operational Security
Federal agencies are under pressure to streamline and modernize infrastructure to reduce costs – and at the same time, they must also improve security. In this era of cloud computing, security products must work together seamlessly, and agency security teams need solutions to defend and protect government assets in the cloud. Cloud computing requires agencies and their security partners to focus on both securing data on-premise and data...
Add Favorite
Red Hat Ansible Webinar Series: Automat...
Join Red Hat's Dan Lemus and partner experts for three webinars worth of insights on Red Hat Ansible, Red Hat's industry-leading platform for building enterprise-wide IT automation. Automate Networks to Accelerate Operations Erik Ellner, Director, State, Local & Education, Dynamic Systems Thursday, July 9, 2020 | 1pm ET; 10am PT The first step in digital transformation is automating your current processes, freeing your teams to focus more...
Add Favorite
Back to Search Begin New Search