Introducing Adobe Captivate Prime
Take Charge of Your LMS There are many learning management systems (LMS) in the marketplace today, but most prove to be complicated, difficult, and painful to use. Adobe is taking eLearning to a whole new level with a new cloud-based platform for learning activity – introducing Adobe Captivate Prime, a modern LMS that empowers agencies to setup, deliver, and track learning from one platform. Captivate Prime is a secure, powerful, yet sim...
CJIS Compliance with Google Apps
CJIS Compliance with Google Apps FBI mandated CJIS compliance is rapidly becoming a top priority for law enforcement and government agencies of all sizes. Compliance can be tricky, but Google can offer the closest thing to guarantee compliance without breaking the bank. Please join Google, Virtru, and Carahsoft for a complimentary webcast on Wednesday, September 2nd to learn more about the CJIS compliance. By utilizing strong, 256-bit, end-to-...
Identify, Prioritize, and Mitigate Your...
Identify, Prioritize, and Mitigate Your Emerging Cyber Threats Recorded Future continuously collects and analyzes information from the web to produce real-time threat intelligence analytics. By consuming this content in Splunk, government teams can increase cybersecurity by assessing internal network observables in the broader context of emerging threats, attackers, and technical indicators on the web. Join us for a complimentary webcast to le...
Automating Incident Response and Vulner...
View our complimentary on-demand webcast to hear about why CyberSponse’s Security Operations Platform (CSOP) is the category creating (patent-pending), workflow automation software for the next-generation System on a Chip (ScC). The CSOP manages enterprise-wide events, incident response, vulnerabilities, threat intelligence, personnel, and all security-related mission and information system processes. Seen through a single pane of glass,...
The Ins and Outs of Risk-Based Authenti...
Traditional ways of securing access to applications have failed. In light of the recent news around identity theft and data breaches, it is obvious that a username and password are not enough. Join TransUnion and Ping Identity for a 30-minute webcast to hear how to put the identities of your internal and external end users at the center of securing access to your applications. Attendees of this webcast will learn about: Proven identity-managem...
GEOINT Virtual Booth Webinar Series
GEOINT Virtual Booth Webinar Series As a proud sponsor of the 2015 GEOINT Symposium, the largest geospatial conference of the year, Carahsoft is hosting a follow-up webinar series. Join Carahsoft and our geospatial solution providers as we explore how agencies are increasingly relying on geospatial technologies to enhance operations, solve complex problems, and leverage existing resources. Session 1: Boundless is the world’s leader in co...
F5 Air Force TechTalk
SSL Break and Inspect Join F5 Networks and Carahsoft to earn (ISC)2 CPE credits and discuss how to create an SSL/TLS strategy for Application Cybersecurity protection in the Datacenter. Learn which SSL/TLS standards are necessary to meet the new DoD requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS designs to mit...
Security and Efficiency with Time Matters
In the legal world, security remains one of the top priorities faced today. We are often challenged with protecting client information, department information, and even classified government documentation. With tightening budgets, how is it possible to maintain the growing workload and demands without trustworthy software and automation? View our complimentary on-demand webcast during which we will discuss how LexisNexis Time Matters allows le...
Detect Advanced Threats with Behavioral...
Behavioral analytics is a new approach to threat detection that uses advanced machine learning and probabilistic math to identify the anomalous actions unique to both outsider and insider attempts to steal sensitive data. Early deployments in the field show this method to be highly effective.View our on-demand webcast to hear data scientist Stephan Jou, CTO of Interset, discuss how behavioral analytics is a game changer when it comes to detect...
The Benefits and Implementation of BIM...
Join Autodesk Carahsoft, and CADD Micro, as we discuss why the time is now for owners to start to understand the business issues of the people who use facility data, and address their data and workflow needs. The loss of information through the life of a building comes at a significant cost. Build a strong foundation for Building, Installation and Facilities Management with accurate and available data on your buildings and facilities assets. G...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.