Protecting Government and Corporate Sup...
Supply chain complexity is rising, and the public and private sectors are stronger together. The resulting approach is called cyber collective defense, and it's changing how businesses and the federal government protect their supply chains.Join IronNet Cybersecurity, Amazon Web Services (AWS), and Carahsoft on June 25th for an insightful webinar on how a collective defense strategy allows federal agencies to:Better understand their threat land...
Kubernetes for Day 2: FedOps
The benefits of Kubernetes are unmatched - but the path to adopting it isn't always clear, especially for the Ops community in the federal space. How can operators overcome those challenges and reap the benefits? Join DevOps guru, Michael Coté, and Craig McLuckie, one of the founders of Kubernetes and VP of Products and Strategy at VMware Tanzu, in a Q&A session about the benefits of containers and K8s for operators. Dive into the...
Continuity of Operations with eSignatur...
More than 1,300 Federal, State and Local organizations use DocuSign to enable citizens, businesses, and staff to work smarter and more effectively with self-service forms, electronic signatures, pre-populated agreements, and automated approval processes. Join your peers and other leaders in Federal to see how you can transform your patients' agreement process by eliminating paper, automating workflows, and connecting the systems within your or...
VMware Virtual Power Block Sessions
VMware and Carahsoft would like to offer you the opportunity to attend a variety of sessions on all of the topics you and your agency care about. Throughout the month of July, we are providing short sessions on: VMware vCloud Foundation Deploying and Managing Kubernetes with Tanzu Mission Control NSX-T as a Security Fabric for Containers Carbon Black How to operationalize Application Control Disaster Recovery in the Software Defined Datacente...
VMware Solutions to Enable a Zero Trust...
Join VMware and Carahsoft for a webcast to learn why zero-trust security is top of mind for organizations more than ever due to COVID-19. The pandemic is driving organizations to re-think how they keep staff productive and supporting the mission with compromising sensitive data and assets. During this webcast, attendees will gain an understanding of why traditional "castle and moat" architectures can be disastrous and how implementing a zero-...
Red Hat Ansible Webinar Series: Automat...
Join Red Hat's Dan Lemus and partner experts for three webinars worth of insights on Red Hat Ansible, Red Hat's industry-leading platform for building enterprise-wide IT automation. Automate Networks to Accelerate Operations Erik Ellner, Director, State, Local & Education, Dynamic Systems Thursday, July 9, 2020 | 1pm ET; 10am PT The first step in digital transformation is automating your current processes, freeing your teams to focus more...
Transform Endpoint Security with VMware...
In 2020, cyber defenders have seen a high level of innovation from cybercriminals, who are leveraging new tactics, techniques, and procedures (TTPs) to maintain persistence and counter incident response efforts. At an alarming rate, transnational organized crime groups and spies are leveraging cybercrime tools and services to conduct a wide range of crimes against government agencies and financial institutions. Criminals are increasingly shari...
Geospatial Tools for Contact Tracing an...
In the wake of the recent pandemic, geospatial tools and workflows can enable contact tracers with the ability to efficiently collect contact information, warn contacts of exposure, and track chains of transmission. Location data powered by Mapbox, alongside Twilio's communication platform, allows contact tracers to interview patients, notify contacts, and send symptom survey reminders to provide optimal support services. This complimentary we...
Gaining More Visibility and Security fo...
In this current disruptive economy situation, security and visibility are the top concerns for government agencies to re-open the economy. With deep expertise in both cloud strategy and security, Kapstone is offering a complete and holistic cloud security and analytics solution that addresses controls, technology, and continuous governance to deliver a secure and compliant cloud that meets regulatory needs and concerns. Join us on Tuesday, Jul...
Immediately Gain Value From IoT
Enterprises are struggling to see value from IoT implementations. One of the main challenges is just getting real-time data from edge devices. Other challenges faced by government agencies include network availability, latency, cost of round-tripping between the edge and the enterprise, monitoring, and more. A new solution is needed to quickly manage and monitor thousands of edge agents deployed in or near the edge devices to enable edge data...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.