Back to Search Begin New Search Save Search Auto-Notify
Cybersecurity Maturity Model Certificat...
VMware and Carahsoft would like to offer you the opportunity to view these on-demands on various topics that your organization may be interested in: Session One: Cybersecurity Maturity Model Certification (CMMC) Updates for the Department of Defense's (DoD) strategic direction on the CMMC program included in version 2.0 Clarifications on the different phases of inclusion for bidders, contractors, and service providers How the Executive Order f...
Add Favorite
The Future of Data Center Interconnect
The rapid growth in data center switch port speeds from 10G to 100G, and now 400G, is driving a new approach to the future of Data Center Interconnect (DCI). Compact modular platforms with superior optical performance up to 800G per wavelength allow data center operators to deploy simple yet carrier-grade secure transport networks effortlessly; all with lower costs per bit, less space and power, simpler operations, and a secure future-proof ar...
Add Favorite
Attack Surface Management: From Reactiv...
As organizations continue to digitize their business and employees are empowered to leverage these capabilities, it’s no wonder security teams struggle to keep track of infrastructure, applications, cloud services and SaaS usage—let alone ensure security policies are adhered to across these environments. The attack surface is dramatically and vastly expanding, and without the proper automation, it is unlikely that security teams wi...
Add Favorite
Accelerating Government Digitization: S...
Although IT leaders understand the benefits of cloud computing, there is still apprehension in the transition process due to new, persistent, and evolving thread models and compliance requirements. As such, the Biden administration issued an executive order to help federal agencies establish a zero-trust framework and effectively secure their enterprise. What impact have these measures had on public sector cybersecurity strategies? During this...
Add Favorite
Google Workspace IN.gov Local Governmen...
During this on-demand webinar, we discuss: Google Workspace as not just email, but a full collaboration and productivity platform Advanced security and compliance with e-discovery capabilities Easy deployment, management, and utilization Pre-negotiated special pricing and terms for State of Indiana
Add Favorite
Security Threats to Consider When Using...
The world spends a lot of time locking down logins. Yet resources are scarce when it comes to rapidly detecting and monitoring compromised credentials and sessions. Plurilock DEFEND offers identity assurance and compromise detection, alerting IT security personnel to potential threats in real-time. The platform runs invisibly, providing continuous identity detection and endpoint visibility in the background as users work. This capability enabl...
Add Favorite
Cybersmart TV: Cloud Security
Government organizations are storing, accessing and sharing more of their data in the cloud than ever before. The cloud gives agencies more flexibility, while at the same time, creates more risk. This webcast will be a conversation on finding the necessary balance between increased collaboration and productivity with maximum security and safety.
Add Favorite
Threat Hunting Masterclass Session 3: L...
Join CybernetIQ and Carahsoft for their three part on-demand Threat Hunting Masterclass. In this on-demand webinar series, Joe Cummins, CEO, CybernetIQ discusses real-life examples of teams, tradecraft, and technologies that are changing the way we see the cybersecurity situation. Session Description Register How to Make Sense of the Who, Why, and What in the Wire Download session one to hear real-life examples of teams, tradecraft, and techno...
Add Favorite
Securing Modern Applications with NGINX
State and Local government agencies at all levels are increasingly turning to modern applications to improve their communications with and responsiveness to the public. Government records and data that were previously isolated and difficult for the public to access are now becoming widely available through APIs. Data like property taxes, public school information, crime statistics, state taxations, permits, etc. are easily available to the pub...
Add Favorite
Google Cloud Work Safer Webinar with Cr...
In this on-demand webinar, you will learn about: Adversaries targeting public sector organizations and how to prepare to stop them How Google Cloud and CrowdStrike's integrated solutions provide proactive automation for threat hunting with shared intelligence across endpoints and workloads for a defense-in-depth infrastructure New strategies to achieve the highest levels of visibility, simplicity, and control to build stronger cybersecurity de...
Add Favorite
Back to Search Begin New Search