Back to Search Begin New Search Save Search Auto-Notify
Amplify and Integrate Your Phishing Def...
Phishing attacks are relentless, and attackers continue to find creative ways to evade perimeter technologies such as Secure Email Gateways (SEGs). As malicious emails continue to reach user inboxes, there's increased risk of account compromise, data breach, and malware attacks, including ransomware. However, by combining training and human intuition with trusted intelligence, you will be able to reduce your organization's phishing threat expo...
Add Favorite
Enable a Remote Workforce and Reduce Co...
Join VMware, GCOM, and Carahsoft as we discuss a strategy to enable a remote workforce, maximizing productivity while minimizing costs. The deployment of a remote worker service, powered by VMware's Digital Workspace technologies and Microsoft Azure Windows Virtual Desktop enables employee access "as-a-service" through the flexible delivery of applications with a traditional desktop experience, supporting functional security and other operati...
Add Favorite
Beyond Traditional Anti-Virus: Protecti...
NS2 delivers innovative technologies from SAP and our affiliates to help our government clients execute their missions, securely. Cyber defense solutions from NS2, powered by GoSecure, are available to Government departments and agencies through the Continuous Diagnostic and Mitigation Program (CDM Program) on the Approved Products List. Help your agency detect and respond to cyber-attacks before they can damage your infrastructure or steal y...
Add Favorite
Improving Remote Employee Support
COVID-19 concerns are changing how agencies run their business and IT operations, dramatically expanding demand for teleworking and application access to collaborative systems. This demand is creating significant challenges for IT operations and has increased the need for IT pros to keep applications, services, and infrastructures up and running—and safe. This instructional webinar will focus on Performance monitoring solutions that prov...
Add Favorite
How to Implement an Effective Zero Trus...
The rapid adoption of IoT devices, cloud infrastructures, the recent expansion of remote workforces, and the increased execution of service contracts with multi-tier contractors have created massive distributed IT networks placing more emphasis on Zero Trust approaches. These distributed environments display increased attack surface areas, creating multiple entry points for adversarial actors to penetrate and potentially own a technology ecosy...
Add Favorite
5 Steps to Comprehensive Data and Threa...
Many state and local government entities face increasingly complex challenges when it comes to keeping important data secure. Today there are more users, devices, applications, and data outside the organizational datacenter than inside. This network inversion introduces new blind spots, leaving agencies vulnerable to a new crop of cloud-enabled and credential-based attacks. Please join Netskope for a webinar to discuss how Netskope has partner...
Add Favorite
Modernize Your On-Prem Datacenter with...
VMware Cloud Foundation brings together virtualized compute, storage, and networking into a unified cloud operating model that allows your organization to reduce costs while increasing agility, standardization, and intrinsic security. By combining consistent infrastructure, operations, and intrinsic security posture across the entire stack, VMware’s Cloud Operating Model serves as the easiest and most efficient way to deploy, update, and...
Add Favorite
Continuity of Operations with eSignatur...
More than 1,300 Federal, State and Local organizations use DocuSign to enable citizens, businesses, and staff to work smarter and more effectively with self-service forms, electronic signatures, pre-populated agreements, and automated approval processes. Join your peers and other leaders in Federal to see how you can transform your patients' agreement process by eliminating paper, automating workflows, and connecting the systems within your or...
Add Favorite
Moving to the Cloud with Operational Security
Federal agencies are under pressure to streamline and modernize infrastructure to reduce costs – and at the same time, they must also improve security. In this era of cloud computing, security products must work together seamlessly, and agency security teams need solutions to defend and protect government assets in the cloud. Cloud computing requires agencies and their security partners to focus on both securing data on-premise and data...
Add Favorite
VMware Virtual Power Block Sessions
VMware and Carahsoft would like to offer you the opportunity to attend a variety of sessions on all of the topics you and your agency care about. Throughout the month of July, we are providing short sessions on: VMware vCloud Foundation Deploying and Managing Kubernetes with Tanzu Mission Control NSX-T as a Security Fabric for Containers Carbon Black How to operationalize Application Control Disaster Recovery in the Software Defined Datacente...
Add Favorite
Back to Search Begin New Search