Back to Search Begin New Search Save Search Auto-Notify
Next Generation Cloud Services for Redu...
Advanced cyber security breach techniques by nation states were wildly successful over the past few months. Thus, a new attack surface within the software supply chain has been exposed and is driving new requirements and shifting the focus of cyber protection across industries and software solution providers. In response, software technology companies worldwide are implementing changes and recommending organizations protect their software supp...
Add Favorite
AWS Virtual Partner Activation Day
Join us on Thursday, October 14th for our AWS Virtual Partner Activation Day. Complete with multiple comprehensive hands-on-labs, this sales training on AWS services focuses on solution sets that are relevant to public sector customers.
Add Favorite
Security Where it Matters: Stay Protect...
VMware’s software portfolio is critical to milCloud® 2.0’s ecosystem. This partnership brings industry experts together to help partners migrate their workflows from on-premise to the cloud, quickly and securely. In this webinar, you will learn: The full scope of milCloud® 2.0 capabilities, a cloud software specifically designed for the warfighter How to utilize milCloud® 2.0 as a business management portal and unique p...
Add Favorite
How Defending Against Ransomware Goes B...
Ransomware attacks have been making headlines again and again. Ransomware evolves and new ones are not only encrypting data and damaging business continuity, but they have also lead to public data leaks of confidential information. CyberArk's solution enables to mitigate the risk related to ransomware by implementing the least privilege approach and credential theft protection to prevent the attack on the machines where it lands, combined with...
Add Favorite
Okta Webinar - Q&A with the University...
Higher Education Institutions face a daunting challenge to streamline, automate, and secure a complex IT ecosystem all while balancing user experience. In the quest to modernize infrastructure and services, the actual cost of managing legacy systems, homegrown solutions, and disparate vendors can have a significant impact. Join this interactive conversation with the University of Notre Dame's Identity and Access Management team to learn about...
Add Favorite
Build Digital Momentum for Justice and...
The pandemic has taught us how essential digital capabilities have become, touching nearly every aspect of our lives. Keeping the justice system operational depends on technology that allows employees to work securely and productively in remote, office, and hybrid work environments. Modern solutions leveraging Adobe Document Cloud (DC) solutions can increase productivity by allowing constituents and employees to access digital documents and ag...
Add Favorite
Secure and Optimize Your Cloud with Goo...
Join AMD, Google Cloud, and Carahsoft for a webinar to learn more about the exciting products AMD is bringing to the Cloud. These new additions include general-purpose N2D, compute-optimized C2D and industry-leading, and price-performance T2D. During this webinar, you will learn about: Data protection with Google Cloud Confidential VMs powered by AMD EPYC™ AMD powered Google Cloud VMs Protecting Your Data on Google Cloud with Confidentia...
Add Favorite
Explore Automation Technology with VMwa...
In this webcast, you will learn: How agencies are using VMware Tanzu to ease the complexity of deploying and managing container-based workloads The benefits of decreasing total cost of ownership (TCO) and bridging the gap between modern and legacy applications How VMware Carbon Black is providing agencies with built-in endpoint security to help them meet compliance standards and implement the NIST security framework
Add Favorite
Ransomware Recovery with Rubrik & Wasabi
Join Rubrik, Wasabi, and Carahsoft on October 20th for a chance to hear from subject-matter experts, as they discuss how to build an industry-leading ransomware recovery plan, while lowering customers' total cost of ownership. To ensure recoverability without breaking the bank, educators and local government IT leaders are leveraging Rubrik's Zero Trust Data Management approach and Wasabi's Hot Cloud Storage to protect from inevitable ransomwa...
Add Favorite
Cybersecurity - Strategy, Policy, and P...
Today's schools face a plethora of challenges when it comes to cybersecurity: they are prime targets for hackers, they lack the resources available to large corporate organizations, and they must secure a widely distributed network of onsite, mobile, and remote users. School districts are now operating more than any time before and are highly dependent on IT resources to perform their functions. These resources have mostly migrated to the clou...
Add Favorite
Back to Search Begin New Search