Secure Software Defined Data Center for...
The speed and pace of cyber threats by state and non-state actors are bombarding DoD network defenses and threatening to undermine the United States' technological military advantage. The recent elevation of US Cyber Command to a unified combatant command demonstrates the resolve to embrace the changing nature of warfare in order to maintain US military superiority across all domains and phases of conflict. This ever-changing face of war has c...
Women in Healthcare Luncheon
Join VMware and Carahsoft over lunch on July 18 as we have a guest speaker in the healthcare industry share her story about leadership, the value of a female perspective, and shaping the future for women in healthcare. This special speaker will offer insight into her experiences with creating opportunities for future women in healthcare, while touching on current trends and advances in medical technology. Join the discussion to gain: Connectio...
IT Infrastructure and SDLC Automation W...
Please join speakers from Red Hat for a hands-on workshop to learn about automating your software development lifecycle and IT infrastructure with Red Hat Ansible. Breakfast will be served, but bring your own laptop so you can have the chance to try out the programs at the workshop. Automation for Everyone Ansible can automate your entire application lifecycle – from servers to applications to clouds to containers and everything in betwe...
Achieve Optimal Threat Protection with...
FireEye Network Security combined with the GigaSECURE Security Delivery Platform offers flexible deployment options and scalability for optimal threat protection. View our on demand webinar to learn about the benefits of using FireEye and Gigamon together, including: Improved visibility from physical, virtual, and cloud environmentsLarge traffic can be load balanced across multiple appliancesDecrypt Inline SSL traffic to expose hidden malware
Securing Modern Applications
In the world of modern application development, apps are launched, changed and decommissioned rapidly. By the time a security team learns of a new application, it has often already changed. With thousands of applications available for instant download, securing your network against potential threats is an ever increasing task. Please join VMware and Carahsoft for a complimentary webcast to learn how AppDefense can help protect your IT infrastr...
Succeeding on Social: Improving Citizen...
Whether visitors to your parks and recreational areas are sharing a story, asking a question, or voicing a complaint, they're talking about their experience on social media. Successful #SocialGov agencies know how to find and engage with those conversations in a way that builds trust and loyalty -- and use citizen insights to deliver better services. View our on demand webinar to hear about the success Parks Canada has had on social at a natio...
Tailoring the Perfect Endpoint Solution...
Learn how to tailor the perfect endpoint solution that will help you make the right choice for your VDI setup. Join us for our ClearCube webcast on July 12th as we discuss: Top five reasons to adopt VDI solutionsKey considerations when choosing a VDI client Cost, types of users, connectivity, security, and manageability Pros and cons of Thin Clients and Zero ClientsVDI solutions featuring ClearCube Thin Clients and Zero Clients
Securing Users Through Continuous Authe...
Plurilock's patented software, the BioTracker, is a multi-layered behavior biometrics security solution that verifies a user's identity by analyzing the unique patterns in how they type, move the mouse, and click. Later this summer, the BioTracker will have the ability to analyze how users swipe and even hold their devices to help prevent security breaches in real-time - reducing the time to detect and respond to intrusions from more than 200...
Akamai Demo Desk
Interested in advanced threat protection at the DNS layer? Well you're in luck! Our team here at Carahsoft will help you understand how you can proactively protect the enterprise with Akamai Enterprise Threat Protector. Join this quick, 30-minute demo to get all of your security questions answered. Register now!
Achieving Identity Assurance in Federal...
Having visibility into who is accessing your network is one of the more important aspects of a strong cybersecurity program. Carahsoft supports the best-of-the-best when it comes to cyber technologies. Join Plurilock and Carahsoft to learn about BioTracker, a multi-layered behavior biometrics security solution that verifies a user’s identity by tracking and analyzing their unique computer movement patterns. During this session we’l...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.