Back to Search Begin New Search Save Search Auto-Notify
Forescout XDR Demo Desk
At this demo desk, we discussed the following key capabilities of Forescout XDR in-depth: Data Ingestion for more than 170 vendor and EDR-agnostic sources including: security, infrastructure, enrichment, applications and Cloud/SaaS sources. How the Threat Detection Engine applies five detection techniques to automatically generate high-fidelity, high-confidence true threats that warrant investigation while weeding out false positives. Full Spe...
Add Favorite
Automated, Intelligent Data Estate Mode...
During this webinar Impetus Technologies, AWS, Carahsoft covered innovative strategies to modernize data platforms to a modern cloud-native architecture for your agency. LeapLogic, Impetus’ cloud accelerator for extract, transform, and load (ETL), data warehouse, Hadoop, and analytics modernization, makes it possible to take on a sizeable transformational migration journey. Having successfully handled many migrations, LeapLogic’s t...
Add Favorite
Secure Applications and Data to Prevent...
Data security is always of utmost concern; today, we're reimagining security for a hybrid cloud future. Many traditional infrastructure stacks are comprised of products from multiple vendors, each decoupled from the stack, providing a narrow and limited view of security. Validating and maintaining a security baseline through continuous software upgrades is time-consuming and often involves error-prone manual processes that take away from innov...
Add Favorite
Operationalizing Zero Trust with Deep O...
Network blind spots prevent Zero Trust deployment from being successful due to the lack of visibility into network telemetry. As the network grows and evolves, this pain will worsen if not addressed at the foundational level. Gigamon Deep Observability ensures your tools and Zero Trust policy engine have access to all network-based communications in your organization. For any effective Zero Trust implementation, full network visibility and eli...
Add Favorite
Deliver Secure Hyper-Converged Infrastr...
With the growing number of digital transformation initiatives, hyper-converged infrastructure (HCI) has emerged as a simple, cost-effective solution. However, as HCIs amass large volumes of data across distributed resources, security compliance becomes a critical factor when protecting data at rest in an HCI. View this 60-minute webcast to learn how you can work with VMware and Thales TCT to deliver secure hyper-converged infrastructure soluti...
Add Favorite
TechNet Cyber 2023 Webinar Series: Prev...
Proofpoint and Carahsoft invited individuals and their cybersecurity teams to join them in an overview of TechNet Cyber 2023. Attendees learned how Proofpoint's people-centric solutions can improve current and future cyber threats. At the end of February, CISA released a Red Team analysis report that highlighted the need for agencies and organization to detect lateral movement techniques, train users on how cybercriminals leverage human-based...
Add Favorite
Leveraging Open-Source Geospatial Servi...
Open-source geo software is commonly used to move massive spatio-temporal data from sensor to end user applications with low latency. The importance of this is exemplified in emergency management/response applications, such as hurricane tracking and modeling, real-time flood, and wildfire applications. The next step for government emergency managers is to know where to find training and support for these open-source geo software applications i...
Add Favorite
AMA: Managing Windows in the Public Sector
If you are an IT pro managing Windows devices for federal, state, or local government institutions, this is the Ask Microsoft Anything (AMA) for you! We'll have engineering and adoption experts on hand and ready to answer your questions and help you empower public sector employees to work from anywhere, on any device, securely and productively. Let's talk about Windows 11 rollouts. Let's look at onboarding for temporary staff and contractors....
Add Favorite
State of the Union: Cohesity and Carahs...
During this webinar Cohesity went over thier latest updates, including thier recent partnership with Carahsoft. Attendees heard how Cohesity was helping public sector organizations simplify how they secure and manage their data. Attendees also learned why to partner with Cohesity and how to conduct business through Carahsoft. During this webinar, attendees learned about: The latest Cohesity product announcements An overview of the Cohesity pub...
Add Favorite
Trend Micro TechNet Cyber Webinar Series
In the ongoing race against malicious actors, acquiring and using high-quality threat intelligence is key to keeping digital assets secure. Every vulnerability discovered and responsibly disclosed reduces the opportunity for malicious actors to craft surprise zero-day attacks. ZDI (Zero Day Initiative) consistently discloses and manages over three times more vulnerabilities than its nearest rival and remains the world's largest vendor-agnostic...
Add Favorite
Back to Search Begin New Search