Back to Search Begin New Search Save Search Auto-Notify
FedRAMP Webinar
Government agencies strive to secure and modernize critical systems from cybersecurity threats and insider threats. Email is by far the most frequent and prolific source of advanced attacks - more than 90% of advanced attacks start with email. Threat actors continue to adapt tools and techniques across attack types to exploit a range of vulnerabilities, including social engineering to trick people into clicking on malicious attachments or URLs...
Add Favorite
Splunk for CMMC Solution
The Splunk for the Cybersecurity Maturity Model Certification (CMMC) solution provides a prescriptive approach for organizations to meet, monitor, and track CMMC's required cybersecurity and compliance practices. The solution's pre-built analytic, dashboards, and workflows provide organizations with a clear path to achieving near-term certification and long-term maturity growth. Join Splunk and Carahsoft for a presentation and demo where we wi...
Add Favorite
The Future of Cyber Secure Schools
Keeping students and their data safe while maintaining a modern and engaging learning environment is a delicate balance for K-12 institutions. Schools struggle to continuously comply to industry and legal standards that continue to grow, while faced with limited IT resources. As education continues to make the move into the realm of internet-based and on-demand education, they have to find ways to bring their IT resources into the same spaces....
Add Favorite
Digitizing Paper-Based Workflows for Go...
Many government agencies start their digital migration journey by scanning paper documents and forms, and making them available online. It is estimated that over 9 million of these documents and forms exist across state and local governments with thousands more scattered across federal agencies. While scanning paper-based forms and documents was a great start to service delivery in previous years, it is now outdated and inefficient, often resu...
Add Favorite
Securing Splunk: Balancing Big Data Ben...
Federal agencies require a simple way to correlate all security-relevant data so they can manage their security posture. Instead of merely watching events after they occur, agencies should anticipate their occurrence and implement measures to limit vulnerabilities in real time. For that, agencies need an analytics-driven SIEM platform such as Splunk. However, once data is correlated by SEIM tools, it becomes extremely valuable. By integrating...
Add Favorite
Webinar Series: Innovate and Inspire Wi...
Whether you are an expert designer or just starting, Adobe Creative Cloud (CC) encompasses a wide array of industry-leading design applications built to bring any idea to life! This complimentary on-demand webinar series will explore how Adobe is inspiring government agencies nationwide to elevate their use of creativity and design through state of the art digital solutions. Join us to learn how to quickly design engaging digital experiences,...
Add Favorite
Webinar Series: Innovate and Inspire Wi...
Whether you are an expert designer or just starting, Adobe Creative Cloud (CC) encompasses a wide array of industry-leading design applications built to bring any idea to life! This complimentary on-demand webinar series will explore how Adobe is inspiring government agencies nationwide to elevate their use of creativity and design through state of the art digital solutions. Join us to learn how to quickly design engaging digital experiences,...
Add Favorite
Webinar Series: Innovate and Inspire Wi...
Whether you are an expert designer or just starting, Adobe Creative Cloud (CC) encompasses a wide array of industry-leading design applications built to bring any idea to life! This complimentary on-demand webinar series will explore how Adobe is inspiring government agencies nationwide to elevate their use of creativity and design through state of the art digital solutions. Join us to learn how to quickly design engaging digital experiences,...
Add Favorite
Secure Your Data with Seagate's TAA ...
Join Seagate Government Solutions in their upcoming webinar as they discuss the importance of security at the data storage level, and how to build safe IT systems with their secure drives. Bill Downer, Vice President of Seagate Government Solutions, will explain the various benefits and capabilities of Seagate's products in this webinar. Their products provide validated and encrypted data storage capabilities, which assures enterprise owners t...
Add Favorite
Identity 3.0 for the Department of Ener...
The Department of Energy has spent years deploying legacy Identity Management (IDM) solutions and Privileged Access Management (PAM) solutions - many having spent millions on deployment, infrastructure, maintenance, and staffing. Little value gained in return - countless hours of effort focused on a handful of systems, directories, or databases with no significant improvement to compliance and security. As agencies move toward digitally transf...
Add Favorite
Back to Search Begin New Search