Federal Podcast Series with AWS and Car...
Welcome to our Federal Podcast Series with AWS and Carahsoft! Our weekly podcast sessions will focus on various solutions, relating to federal customers, that your organization might be interested in. Episode 7: Archiving, Purging and Strategic Back-up of Data with RV Global Solutions This episode with Rahul Gangu and Venkat Chivukula from RV Global Solutions, discuss how to leverage the AWS cloud for the highest ROI when archiving, purging an...
How to Get Started with Adobe Sign at USDA
As the U.S. Department of Agriculture (USDA) advances to 100% paperless processes to meet digital transformation initiatives, Adobe Sign is empowering USDA users to deliver fast, legal, and secure digital document services for improved efficiencies, automated processes, and ensured compliance through a paperless signing experience. Join our complimentary webinar to discover how to eliminate the hassle of printing, signing, and scanning documen...
Accelerate Data Analytics with Artifici...
Recent advancements in compute, networking, and storage technologies have highlighted high performance computing (HPC) along with putting data analytics and AI within reach for many agencies. Dell EMC's HPC Ready Solution for AI and data analytics optimized with Intel processors allow for quick deployments in high performance computing resources that can match the needs of any agency. Join Dell Technologies, Intel, and Carahsoft for an upcomin...
Building an Effective Identity and Data...
79 percent of organizations have experienced an identity-related security breach in the last two years and the number of breaches continues to rise. With the exponential growth in unstructured data each year, coupled with cloud adoption and IoT devices, it is critical that organizations address their Identity and Data Management (IDM) program. So where is the best place to start? Having a foundational understanding of the current state of Iden...
Cybersecurity Executive Order Challenge...
The recent ransomware attacks on software supply chains have highlighted the need for improved national cybersecurity efforts. The Executive Order on improving the nation's cybersecurity emphasizes the reality that federal agencies are equally exposed to cyber threats as commercial organizations. Register now for Micro Focus' webinar on the Cybersecurity Executive Order Challenges and Strategies. In this webinar, Senior Cybersecurity Executive...
Email: The Most Significant Threat to Y...
Email remains a significant security threat for organizations because cybercriminals continue to favor email to distribute malware, phishing scams, and spam. Why? Because it works. Email can easily be copied to appear legitimate, and it gets delivered to the end-user, wanted or not. Join Trustwave on Tuesday, July 27th, to hear their Sr. Product Manager unpack the Trustwave 2021 Email Threat Report. You'll have the opportunity to learn about:...
Simplifying IT Security for the Classro...
Back to business as usual: Ensuring your WAN is secured with GCOM, Fortinet SD-WAN and Carahsoft Network engineering and operations leaders have struggled to incorporate digital innovation initiatives at branch and remote locations due to the limits of traditional WAN infrastructure. SD-WAN is increasingly seen as the solution for addressing these problems. Join Fortinet, GCOM and Carahsoft as we explore a true secure SD-WAN solution to help g...
Demystifying The Technology Modernizati...
The Technology Modernization Fund (TMF) was enacted as part of the Modernizing Government Technology Act of 2017, with a goal of better securing sensitive Federal systems and data while utilizing taxpayer dollars as efficiently as possible. Earlier this year, the American Rescue Plan Act added $1 Billion dollars to the program. These funds can help agencies (Civilian, DoD, and the Intelligence Community) modernize systems, expand cybersecurity...
Protecting Public Sector Agencies Again...
The global pandemic has materially increased citizen engagement with government applications across federal, state, local, and education levels. In turn, it has also accelerated cyberattacks and opened up new opportunities for attackers to enrich themselves. Join F5 and Carahsoft for a webinar addressing the why and how of defending public sector agencies against credential stuffing attacks. During this webinar, we will cover: The impact of cr...
ExtraHop Demo Desk
Agencies today are working across different platforms and environments, creating a complex web of workloads consisting of hardware, applications, and data spread. Whether it's on edge, core, remote workforce, or cloud deployments, visibility is essentially to ensure security within the organization. Now, as a hybrid, multi-cloud, and containerized environments are standing up, unifying security controls across different environments is critica...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.