Back to Search Begin New Search Save Search Auto-Notify
Google Cloud 2020 Webinar Series: Strat...
Join Google Cloud and Carahsoft for a webinar to receive a roadmap of database migration options and strategies for migrating to GCP. Moving your existing on-prem workload can be challenging when your agency doesn't have a clear understanding of how to move its databases with minimum risk. Register and attend to learn how to run a comprehensive assessment of existing on-prem environments and provide a list of criteria for decision making, a ro...
Add Favorite
Security Transformed with Zero Trust
High-profile breaches involving "trusted" insiders showcases the fact that trust is something malicious actors can exploit to their advantage. John Kindervag, Palo Alto Networks Field CTO, created Zero Trust on the principle of "never trust, always verify," to help organizations effectively segment their networks and relieve any doubts of insider attacks. In recent years, Zero Trust has evolved to become a strategic Cybersecurity initiative th...
Add Favorite
NVIDIA Webinar - From Cloud to On-Prem
Artificial Intelligence (AI) promises to unlock new frontiers, but its adoption in government has been limited. Slow-computing architectures can't deliver the resources demanded by modern AI use cases and "shadow-IT" implementations can't scale. This year, government IT managers have the opportunity to lead with an infrastructure strategy that enables their organization to realize the benefits of accelerated AI development across people, proce...
Add Favorite
Mitigating Your Data Complexity
Too many organizations struggle with the complexity of their own data. An extensive 50-60 percent of enterprise data is "dark" and serves no valuable insight, according to IBM and Veritas research – don't let your agency be held back by that same confusion. You need to be able to tackle business challenges without worrying about the complexity of your IT environment. Join us for a live webinar on the necessity of abstracting complexity f...
Add Favorite
Live Webinar: Transformative Digital En...
Join Principal Systems Engineer Cary Bryczek for a webinar to discuss how Jama Software's modern approach to digital engineering bridges the gap between modeling tools and the siloed document world. Guidance released by the U.S. Secretary of Defense in 2018 urged government organizations to put in place new practices to modernize delivered systems with an emphasis on accelerating delivery. Is your organization prepared to undergo this digital...
Add Favorite
Protecting Your Election Security Infra...
Join F5 Networks and Carahsoft for an in-depth overview of the election system threat landscape, attack surface, bots and botnets, and zero-trust principles to protect election infrastructure. With the 2020 election cycles on the horizon, now is the perfect time to brush up on election security concepts and how F5 solutions protect this critical infrastructure.This webinar will discuss how F5 provides a variety of security solutions to mitigat...
Add Favorite
PeopleSoft Best Practices: Secure Acces...
As the core of your organization, sensitive data inside PeopleSoft has become a top target for malicious threats. Both internally and externally. With native PeopleSoft security and compliance features trying to keep up with modern threats, organizations must evaluate strategies to strengthen authentication and gain deeper visibility into user activity. Join Appsian and Carahsoft, during their webinar, as PeopleSoft experts at Appsian discuss:...
Add Favorite
Identify and Prevent Ransomware Attacks
Ransomware attacks on colleges and universities are the latest cyber threat to hit the headlines. Reports from campuses in Colorado, New Jersey, and New York City are the latest examples of how higher education is one of the most targeted industries with a significant number of users and vast amounts of data to protect.If successful, ransomware attacks have proven to be extremely lucrative. Security leaders within higher education need strateg...
Add Favorite
SAP ERP Best Practices: Strengthen Acce...
As the core of your organization, the business risks inherent with users executing transactions inside SAP can be costly, time-consuming to remediate, and damaging to an organization's reputation. With native SAP security and compliance features failing to keep up with today's dynamic threats, organizations must evaluate strategies for strengthening access controls and gaining deeper visibility into user activity. Join Appsian and Carahsoft, d...
Add Favorite
Let's Take This Online
Have you been hesitant to make the switch to virtual classrooms? Maybe you have one, but just don't like using it. There are so many things to love about in-person classroom interactions - seeing your trainees face-to-face, answering their questions as they come up, and breaking them into groups to discuss and learn from each other. Besides, you love sitting in traffic on your way to work, traveling to remote offices to train other teams, and...
Add Favorite
Back to Search Begin New Search