Transform your Business with VMware Clo...
VMware Cloud Foundation brings together virtualized compute, storage, and networking into a unified cloud operating model that allows your organization to reduce costs while increasing agility, standardization, and intrinsic security. VMware’s Cloud Operating Model combines consistent infrastructure, operations, and intrinsic security posture across the entire stack. This is the way to deploy, maintain, and update the software-defined da...
Google Cloud October Webinar Series: As...
Join Google Cloud and Carahsoft for a deep-dive webcast on VM Migration. We plan to walk you through what an assessment of your on-prem environment would look like, how we do the assessment, and the immediate value you get out of it. From there, we will go in-depth on some customer scenarios that have already gone down this path with us. We will discuss how those customers chose to first adopt the cloud, based on their business needs and chall...
Reduce Downtime. Gain Complete Visibili...
Join us on October 15th for a webinar where we will be covering a brief Splunk introduction, eliminating data silos, and server monitoring. Splunk is a log analysis platform that allows you to collect all logs, metrics, configurations, and messages so that you can search, correlate, alert, and report across your server in seconds. Eliminating silos allows for complete operational visibility across heterogeneous environments consisting of Windo...
Adobe Digital Government Technology Con...
Adobe and Carahsoft invite you to join us for the 2019 Adobe Digital Government Technology Conference to discover how Adobe is leading in digital transformation across federal, state, and local agencies. This year's conference will feature sessions geared around digital government and customer experience (CX) best practices through tactical learning tracks covering web modernization, outreach and engagement, forms and document transformation,...
McAfee's New Capabilities for NIH Webinar
National Institutes of Health’s mission is to seek fundamental knowledge about the nature and behavior of living systems and the application of that knowledge to enhance health, lengthen life, and reduce illness and disability. They have identified Cyber Security as a key, strategic initiative needed to protect the personal information of the customers they serve. NIH desires an industry-leading platform approach that offers scalability,...
Working with Mainframe and IBM i Data i...
Mainframes and IBM i systems continue to run many critical applications in the public sector; however, these systems are often left out of Splunk deployments because their data is complex and difficult to work with. A blind spot in your security and operational intelligence puts your organization at risk of failing an audit, or worse, so it's imperative to close this gap fast. Ironstream for Splunk helps eliminate this blind spot, by collectin...
Improve Detection & Notification of Ran...
Do you have centralized visibility in your environment? Are you able to quickly detect and respond to advanced threats? Do you have the skill sets and resources to protect and remediate potential data breaches? Ransomware has hit government agencies hard across the country with an enormous increase in attacks from the previous year. Texas has not been immune to these threats either, as attackers continue to find new methods of exploiting vulne...
Brokering Services to Support IT Modern...
As the government CIO role evolves from IT support to business partner and broker of services, there is a need to have a different governance model and more willingness to standardize than before. So how does this work? What steps can you still take to simplify the IT stack, get better performance, lower costs, and make the service easier to consume-- whether it be case management, AI, identity management, payment systems, or any other common...
ICAM Modernization: Honoring Your Legac...
You are invited to join Okta, SailPoint, and Radiant Logic on the morning of October 22nd as we gather to learn from and engage with Identity Credentials and Access Management (ICAM) experts. We will discuss their best-in-class identity governance, access management and virtualization solution and how it is proven to facilitate digital transformation, providing agencies and organizations the convenience of unified access and single sign-on wit...
Web Application Firewall (WAF) and DDoS...
Join F5 Networks and Carahsoft for a webinar where we will discuss how your organization can deploy managed security services for every application, anywhere, without upfront investments in IT infrastructure and support. With F5's fully-managed Web Application Firewall (WAF) and DDoS Protection services, you'll be protected against the 10 most common web application attacks, malicious bots that consume valuable resources, and DoS attacks.F5's...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.