Web Application Firewall (WAF) and DDoS...
Join F5 Networks and Carahsoft for a webinar where we will discuss how your organization can deploy managed security services for every application, anywhere, without upfront investments in IT infrastructure and support. With F5's fully-managed Web Application Firewall (WAF) and DDoS Protection services, you'll be protected against the 10 most common web application attacks, malicious bots that consume valuable resources, and DoS attacks.F5's...
Delivering the Power of Collective Cybe...
Since IronNet was founded in 2014 by General Keith Alexander, the mission has been to deliver the power of collective cybersecurity to defend companies, sectors, and nations so that we all can live and work with peace of mind in cyberspace. Today, organizations around the world turn to IronNet to detect known and unknown cyber threat targets in their networks and share that information with peers so that all members can collectively defend aga...
Splunk Cloud Meets the FedRAMP Security...
Join Splunk and your DOE peers in this on demand webcast on the recent Splunk FedRAMP authorization and what this means to DOE. During this DOE-focused webinar attendees will gain insight regarding: Overview of Splunk's FedRAMP announcement & Compliance Aspects of Splunk Cloud Benefits of leveraging Splunk in the cloud Splunk apps and premium solutions authorized for use What is and isn't covered when leveraging Splunk's FedRAMP SaaS offer...
Getting Started with Splunk Data Manipulation
Join us on January 15th for the Getting Started with Splunk Data Manipulation workshop, a hands-on introduction to the Splunk GUI. Attendees will learn how to upload a .csv to Splunk, perform simple field extractions, and build basic dashboards and reports! During this virtual workshop, attendees will utilize data to: Build several searches to gain more insight on the data set Explore how to set conditional searches Build custom visualizations...
Adopt a People-Centric Approach to Security
Security leaders at government agencies have a complex workforce to protect. Today, agency employees, contractors, partners, and even citizens all need access to applications and resources from a variety of different locations, including at work, at home, or from a local coffee shop. The rise of cloud and mobile devices has catalyzed rethinking modern security, but amidst this complexity, one consistency remains: credential-harvesting is the m...
Google Cloud 2020 Webinar Series: Janua...
The IT infrastructure of many government agencies is largely comprised of Virtual Machines. As CIOs begin to implement their Cloud adoption strategies, it is imperative that their teams understand the processes and tools available for moving these workloads to the Cloud. This webinar will cover the lift and shift approach to migration and how Google can help accelerate the path to the Cloud for Linux and Windows Virtual Machines. During this w...
Next Level Security with Infoblox
Security teams know painfully well that it takes too long from the time a breach happens to being able to identify what happened and how. Rather than investing in another security tool, what you need is a smarter and more efficient way to manage and secure your entire network. The Infoblox security solution is a platform designed from the ground up to protect enterprise networks, users and devices from becoming victims of today's sophisticated...
Adobe Digital Learning Seminar in San A...
Every day you undertake the challenge of training your workforce to maintain compliance, work skills, and relevance, and with all the resources you put into training, you want to make sure the message sticks. Join us in San Antonio to discover how understanding the modern adult learner and identifying their style of learning will affect your content mediums and delivery styles. Whether you teach in-person, online, or in a blended learning env...
Google Cloud 2020 Webinar Series: Strat...
Join Google Cloud and Carahsoft for a webinar to receive a roadmap of database migration options and strategies for migrating to GCP. Moving your existing on-prem workload can be challenging when your agency doesn't have a clear understanding of how to move its databases with minimum risk. Register and attend to learn how to run a comprehensive assessment of existing on-prem environments and provide a list of criteria for decision making, a ro...
Security Transformed with Zero Trust
High-profile breaches involving "trusted" insiders showcases the fact that trust is something malicious actors can exploit to their advantage. John Kindervag, Palo Alto Networks Field CTO, created Zero Trust on the principle of "never trust, always verify," to help organizations effectively segment their networks and relieve any doubts of insider attacks. In recent years, Zero Trust has evolved to become a strategic Cybersecurity initiative th...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.