Back to Search Begin New Search Save Search Auto-Notify
Protecting Critical Data from a Cyber Attack
Once an organization is infiltrated, data is usually compromised within hours. The inability to detect an intruder gives hackers time to not only expose confidential information, but also destroy mission-critical data. Could your organization survive an attack? Join this complimentary webinar to explore Dell EMC's Ransomware and Cyber Recovery solution and its advanced protection services to ensure the "heartbeat" of your organization remains...
April 10, 2018
Organizer: Dell EMC Gov Team at Carahsoft Technology Corp
Location: Webcast
Add Favorite
Dell EMC Ransomware & Cyber Recovery Webinar
Protecting Critical Data from a Cyber Attack Date: Tuesday, April 10, 2018Time: 11:00am ET; 8:00am PTDuration: 60 minutesLocation: Online *Register and attend this webinar to receive 1 CPE credit. Once an organization is infiltrated, data is usually compromised within hours. The inability to detect an intruder gives hackers time to not only expose confidential information, but also destroy mission-critical data. Could your organization survive...
April 10, 2018
Organizer: Dell EMC Gov Team at Carahsoft Technology Corp
Location: Webcast
Add Favorite
F5 Government Technology Symposium
Federal Agencies are under ever increasing pressure to meet the Cloud First mandate and still maintain their security and regulatory compliance postures. Complicating matters even further, the 2017 Verizon Data breach report highlighted that 62% of the breaches involved application level hacking, and 81% of the hacking incidents involved weak or stolen passwords. This evolving combination of attack vectors makes cloud based applications a part...
April 3-4, 2018
Organizer: F5 Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
F5 TechTalk - Privileged User Work Grou...
Are your network administrators using strong authentication? The DoD Cybersecurity Discipline Implementation Plan's top priority line of effort is Strong Authentication for Privileged Users. Join F5 Networks for a complimentary TechTalk at the AFCEA Cyberspace Symposium where you will learn how your routers, switches, secure telephony administration interfaces, firewall, IDS/IPS, DLP administration interfaces, storage array interfaces, VDI, an...
March 7, 2018
Organizer: F5 Networks Gov Team at Carahsoft Technology Corp
Location: Colorado Springs, CO
Add Favorite
F5 Security TechTalk - Next Gen Bot Defense
Recent studies have shown that at least 50% of the traffic on the Internet is generated by bots – automated scripts and processes. A small amount of that traffic is considered benign, but most of it is malicious. Regardless of its motivation, one thing is certain, malicious bots consume a huge amount of valuable server and application resources. Join F5 Networks for a TechTalk to learn key methodologies for shunning bots and other automa...
February 8, 2018
Organizer: F5 Networks Gov Team at Carahsoft Technology Corp
Location: Troy, NY
Add Favorite
F5 WV Seminar
Make Your Cloud Environments Less "Wild" and More"Wonderful" with F5 Networks! F5 is hitting the road! We’re bringing our "wildly" successful Exploring F5 Seminar Series to Martinsburg, WV! Please join F5 Networks for a special edition of our Seminar Series that combines two sessions into one. First, we’ll explore how F5 can enable NetOpsteams with the necessary tools to start programmatically configuring their F5 devices through...
December 12, 2017
Organizer: F5 Networks Gov Team at Carahsoft Technology Corp
Location: Martinsburg, WV
Add Favorite
F5 Gov TechTalk - Charleston
Traditional firewalls (Layer 3-4) are purpose built to prevent external access to internal network resources, but these traditional firewalls offer little to no application layer protection. Threat vectors exist today at all layers of the network. Slowloris and HTTP flood attacks are examples of layer 7 attacks which would be undetected by most network firewalls. The impact of these undetected layer 7 attacks is the disruption of your mission...
November 14, 2017
Organizer: F5 Government Team at Carahsoft Technology Corp
Location: North Charleston, SC
Add Favorite
Palo Alto Networks Virtualized Data Cen...
Interested in taking a Palo Alto Networks virtualized next-generation firewall product for a test drive? Palo Alto Networks, VMware, and Carahsoft invite you to take the Ultimate Test Drive Virtualized Datacenter workshop! You will get hands-on experience with the Palo Alto Networks Enterprise Security Platform.This is a FREE half-day technical workshop dedicated to cyber threat prevention. In this workshop, you will learn how to: Gain full vi...
September 20, 2017
Organizer: Palo Alto Networks Team at Carahsoft Technology Corp.
Location: Sacramento, CA
Add Favorite
HPE Protect 2017
Discover the new future for security You invest significant time and budget into protecting what matters. So what does it mean to you when your security software provider merges with another company? You get the very best of both security and IT operations solutions to address your top-of-mind issues. You enjoy the comfort of knowing that one of the world’s largest software companies is committed to your business needs and technology inv...
September 11-13, 2017
Organizer: HPE Team at Carahsoft Technology Corp.
Location: Washington, DC
Add Favorite
Google Cloud Road Show at DoDIIS Worldwide
Increase Your Agency's Efficiency with Google Cloud Solutions Please join Google and Carahsoft in St. Louis on Tuesday, August 15, 2017 to hear how Google technology can be used to support enterprise strategies in your environment. Machine Learning is the next horizon in computing, moving the task of computers from purely computational and into qualitative analysis. Google has been a leader in Machine Learning for nearly 15 years. Recently, G...
August 15, 2017
Organizer: Google Cloud Government Team at Carahsoft Tech.
Location: St. Louis, MO
Add Favorite
Back to Search Begin New Search