Next Steps for Managing Your Remote Wor...
In the race to set up a remote workforce, it is important to understand what identity risks and vulnerabilities that may have resulted from enabling employees to work from home. Gaining visibility and managing changes in access and entitlements is essential to your security posture, but it does not have to be hard.Join us for this informative session to explore the RSA Identity Governance and Lifecycle solution to deliver visibility and busine...
Carahsoft Reception at RSA Public Sector Day
Carahsoft is pleased to host a networking reception for our vendor partners and their customers participating in RSA Public Sector Day at RSA Conference 2020. Please join us for our Carahsoft Reception following the RSA Public Sector Day on Monday, February 24th for food, drinks, and music at Cityscape Lounge. Kindly remember to wear your RSA Public Sector Day badge in order to gain entry into the event. We look forward to seeing you there!
Protect Your Data from Ransomware at Ev...
Explore how Dell EMC's Data Protection Solutions and RSA's Identity Perspective can successfully secure your infrastructure, increase your platform efficiency, and simplify management processes. Enjoy the on-demand webcast and learn how these solutions can protect your workspace with threat detection and data protection. During this webcast, you can expect to learn about: How Dell EMC's Data Protection Solutions simplifies data protection choi...
RSA Public Sector Day 2018
We cordially invite you to a special program at RSA Conference 2018 designed for Public Service, US Federal, DOD, and State & Local Government. Join your peers, government IT luminaries, and RSA executives for engaging government-specific sessions, high profile keynotes, and the premier public sector networking event of the conference. *RSA Public Sector Day is offered at no cost.
RSA Partner Kickoff 2018
RSA is holding our seventh annual Virtual Partner Kickoff - view it on-demand. During this exclusive partner-only virtual event, you will hear directly from RSA leaders on the strategic direction that RSA is taking in 2018 and beyond. Get a sneak peek at RSA product updates before they are widely announced at RSA Conference USA! You'll also have first-hand access to the latest RSA presentations, tools and resources.
RSA Archer Webcast
Learn more about the five key "function" areas which define the CSF: identify, protect, detect, respond, and recover. In today's perimeter-free world, deploying multiple, prevention-focused, point products or focusing only on meeting regulatory compliance guidelines are not sufficient to provide the comprehensive protection required by government enterprise. Government organizations must deploy integrated capabilities along with best operatio...
Enhance Your Data-Driven Security Strat...
With less than two months before RSA Charge 2017, it’s time to plan an experience that meets your needs. This year’s agenda delivers a powerful combination of over 35 hands-on labs, 90 sessions, and 140 thought leaders and industry experts. During the three-day event, you will have an opportunity to engage with an elite community of customers and partners around pressing issues across cybersecurity and business risk management. Thi...
Hunt for Malware at Your Most Vulnerabl...
Endpoints – now more than ever – remain the most vulnerable attack vector. Complicating matters further, security solutions such as antivirus software on endpoints, are simply unprepared for these new threats. Join us on May 25th to learn how RSA NetWitness® Endpoint helps address this challenge by helping security teams detect and respond to known, unknown, and non-malware endpoint attacks. NetWitness® Endpoint is the endp...
RSA and Assurance Data Spy Museum Lunch...
Join us for a luncheon briefing where you can join an exclusive group of your peers to learn how others are approaching the problem of hunting for malware on your networks and endpoint. Gone are the days of "set it and forget it" antivirus and firewall preventative tools, which gave you confidence that your network and endpoints were protected. We are now in the days of advanced persistent threats (APTs) and zero-day malware, which is malware...
Increased Government Security Through E...
Since large and small government organizations rely on a safe, secure, and resilient infrastructure, it's essential to understand how technology can help preserve operational continuity without interruption. Business resiliency programs can enable a centralized, consistent, and automated approach to business continuity and disaster recovery planning, allowing government organizations to apply best practices across their enterprise while enabli...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.