Safeguarding Sensitive and Compliant Da...
Join us for a complimentary webinar on April 23rd to discuss how Thales TCT and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solutions to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file-level access control, encryption, and key management are substantia...
Google Cloud 2020 Webinar Series: Actio...
Get insights into external file sharing, visibility into spam and malware targeting users within your organization, and metrics to demonstrate your security effectiveness in a single, comprehensive dashboard. Join Google Cloud and Carahsoft to learn how you can identify, triage, and take action on security and privacy issues in your domain. During this on-demand webinar, you will learn how to: Understand which files have been shared outside yo...
Enhance Visual Insight from Your Aerial...
When it comes to gathering visual data, drones can assist while reducing risk, saving time, and decreasing costs. These aerial systems come in all shapes and sizes and can utilize a variety of sensors depending on the task at hand.So, how do you pick the right one for the job? Start with your desired data and work backward from there. The data you need will determine the requirements of your vehicle. Register today for our complimentary webina...
Turn Data Into Doing with Splunk - Week...
The speed and the velocity of the decisions that public sector leaders have to make has increased, and the criticality or impact of those decisions is increasing as well. Getting every decision right could make or break the mission. That's ultimately the challenge today. How can I make decisions faster? And how can I be more confident in each decision that I make? Join Splunk for our on-demand weekly webinar series to learn more about how brin...
Splunk & Forescout for Smart Transportation
Join Splunk, Forescout, and Carahsoft to see how Forescout provides continuous visibility of connected devices to Splunk to better identify, prioritize, and respond to incidents. The joint integration also enables the getting and storing of Forescout actions in Splunk. Policy-driven actions can be triggered by Splunk and executed through Forescout for immediate incident response. Forescout sends the action results to Splunk to facilitate close...
Google Cloud 2020 Webinar Series: Secur...
Join Google Cloud and Carahsoft to learn how Anthos is an open hybrid and multi-cloud application platform that enables you to modernize your existing applications, build new ones, and run them anywhere in a secure manner. uilt on open source technologies pioneered by Google - including Kubernetes, Istio, and Knative - Anthos enables consistency between on-premises and cloud environments and helps accelerate application development. During thi...
Enterprise Archiving For Federal Agencies
With email being the largest repository to manage, it's critical that Federal agencies supervise and retain this content according to regulations. Proofpoint Enterprise Archive is a FedRAMP authorized, cloud-based email archiving solution. It provides a centralized, third party, searchable repository to help federal agencies simplify legal discovery, respond to FOIA requests, and implement email records management according to NARA Capstone g...
Splunk ESI Contract and DoD
DoD has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to DoDHow to leverage the contractDon't miss out. Registe...
DevSecOps in a Mission-Critical Environment
The Joint Strike Fighter (JSF) Program is the Department of Defense's focal point for defining next-generation strike aircraft weapon systems for the Navy, Air Force, Marines, and our allies. As the operational tempo has evolved, the requirements of the fleet have the need to develop a new approach to software development and sustainment. This approach is Software Modernization, an effective hybrid of development and sustainment that involves...
New DHS CISA TIC 3.0 Guidance Makes Clo...
Effective immediately, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) issued new TIC 3.0 guidance allowing agencies to roll out zero trust direct-to-cloud connections through cloud service providers (CSPs) that meet CISA guidelines. This new guidance helps agencies avoid the challenges of VPN, which include infrastructure exposure and highly latent traffic paths due to traffic being forced to tr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.