Back to Search Begin New Search Save Search Auto-Notify
Secure and Optimize Your Cloud with Goo...
Join AMD, Google Cloud, and Carahsoft for a webinar to learn more about the exciting products AMD is bringing to the Cloud. These new additions include general-purpose N2D, compute-optimized C2D and industry-leading, and price-performance T2D. During this webinar, you will learn about: Data protection with Google Cloud Confidential VMs powered by AMD EPYC™ AMD powered Google Cloud VMs Protecting Your Data on Google Cloud with Confidentia...
Add Favorite
Explore Automation Technology with VMwa...
In this webcast, you will learn: How agencies are using VMware Tanzu to ease the complexity of deploying and managing container-based workloads The benefits of decreasing total cost of ownership (TCO) and bridging the gap between modern and legacy applications How VMware Carbon Black is providing agencies with built-in endpoint security to help them meet compliance standards and implement the NIST security framework
Add Favorite
Ransomware Recovery with Rubrik & Wasabi
Join Rubrik, Wasabi, and Carahsoft on October 20th for a chance to hear from subject-matter experts, as they discuss how to build an industry-leading ransomware recovery plan, while lowering customers' total cost of ownership. To ensure recoverability without breaking the bank, educators and local government IT leaders are leveraging Rubrik's Zero Trust Data Management approach and Wasabi's Hot Cloud Storage to protect from inevitable ransomwa...
Add Favorite
Cybersecurity - Strategy, Policy, and P...
Today's schools face a plethora of challenges when it comes to cybersecurity: they are prime targets for hackers, they lack the resources available to large corporate organizations, and they must secure a widely distributed network of onsite, mobile, and remote users. School districts are now operating more than any time before and are highly dependent on IT resources to perform their functions. These resources have mostly migrated to the clou...
Add Favorite
Powering Geospatial Analysis Using Goog...
Delivering geospatial analytics quickly, accurately, and with an outstanding user experience has never been more important. With torrents of data available to the average user, a decisive toolset for parsing and exploiting this data is critical for operational and response planning. Join Google Maps, T-Sciences, and Carahsoft as we explore the unique fusion of capabilities between the Google Maps Platform and Luciad, a next-generation 3D and 4...
Add Favorite
Office 365 Webinar
Join us for a live webinar to learn how SolarWinds solutions for observability for Microsoft Office 365® (O365) can help in performance and security. As organizations adopt O365, IT teams focus and responsibility shift to more hybrid operations. These present new issues when needing to aggregate on-premises and cloud operations. Observability helps ensure effective operations and identify faults at the cloud, ISP, or site level to ensure w...
Add Favorite
Fortinet Demo Desk
Organizations face an expanding attack surface with all the people and devices that connect to or exists on their networks. With the rise in IoT devices and work from home trends, the traditional approach of perimeter defense has dissolved. The result is that network owners need help to regain control of their network, devices, and users. To protect this expanded attack surface, Zero Trust Architecture has been the go-to frameworks for many di...
Add Favorite
Low-Code Application Creation on the Se...
Join us for a webinar where we will explore how ServiceNow's unique platform approach and ICF's delivery of low-code development can help you build cross-enterprise apps fast, deliver experiences your end-users love, and scale apps without sprawl. During this webinar you will learn: What low-code development is The benefits of low-code development The Value of low-code/no-code Successes in low-code/no-code How to get involved in low-code/no-code
Add Favorite
Strengthen Your Security Defenses with...
As your agency continues to grow in size and technical complexity, it's important to consider the security of your information. Hackers pose a serious threat to your data and put your agency at potential risk of exposure. This puts stress on IT teams who are figuring out the best methods to mitigate the risk of losing sensitive information from within. Micro Focus and Novacoast have partnered to bring you a cutting edge Identity Management sol...
Add Favorite
Protect Agency Data BEFORE a Ransomware...
Malicious cyber actors are part of today's reality. Not only is a ransomware attack on an agency a public affairs issue, combatting ransomware needs to begin before the attack so your agency doesn't have to waste time with stopped work and lost data should your agency information be breached. In this webinar, attendees will learn how Delphix can provide their agency with a route to immediately restore agency operations after an attack by tempo...
Add Favorite
Back to Search Begin New Search