Back to Search Begin New Search Save Search Auto-Notify
Securing JIE/JRSS Alignment - Florida
Secure Your Resources, Simplify Authentication, and Consolidate Infrastructure in a Joint Environment - While Maintaining Command and Control of Your Applications Authentication, application security, remote access, and application portability (IPN, milCLOUD, CDC’s, public cloud) are challenges when preparing an environment to support consolidation, Joint Information Environment efforts, and coalition/mission partner users. F5 improves a...
March 12, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Eglin AFB, FL
Add Favorite
EMC Cloud Array Webcast: Cloud Integrat...
View our on-demand web presentation discussing EMC’s recent acquisition of TwinStrata and their CloudArray technology. CloudArray is cloud integrated storage which allows organizations to extend their storage infrastructure into public or private cloud environments. You’ll also learn about where CloudArray is being integrated within EMC e.g. VMAX3, ViPR/ECS, Isilon, and VSPEX BLUE. We look forward to having you!
March 11, 2015
Organizer: The EMC Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Securing JIE/JRSS Alignment - Alabama
Secure Your Resources, Simplify Authentication, and Consolidate Infrastructure in a Joint Environment - While Maintaining Command and Control of Your Applications Authentication, application security, remote access, and application portability (IPN, milCLOUD, CDC’s, public cloud) are challenges when preparing an environment to support consolidation, Joint Information Environment efforts, and coalition/mission partner users. F5 improves a...
March 11, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Gunter AFB, AL
Add Favorite
Insider Threat Protection at the Point of Use
Traditional security products like antivirus, VPN, and disk encryption have a major weakness: they stop working when the user views your data. Your employees work in the real world where laptops, tablets, virtual desktops, and open offices put your data at risk to threats that can’t be detected or prevented by conventional tools. Mobile devices and insiders are responsible for the majority of data breaches in the US. Why, after years of...
March 10, 2015
Organizer: Oculis Labs Government Team at Carahsoft
Location: Webcast
Add Favorite
Take Your Monarch Solution to the Next Level
As a Monarch user, you are fully aware of the solution’s powerful ability to capture, transform, and model data from virtually any source. But have you considered how you can take Monarch to the next level? Datawatch is excited to show the Monarch community additional ways to save time, money, effort, and to help our customers build a more successful data environment. View our complimentary on-demandwebcast to learn more about: The lates...
March 3, 2015
Organizer: Datawatch Government Team at Carahsoft
Location: Webcast
Add Favorite
It's a New World of Threats and Solutions
Over 84 percent of organizations discover Advanced Persistent Threat (APT) attacks weeks or months after initial infection has already occurred and information has been exfiltrated. Are you part of the 84 percent? The Infoblox DNS Firewall for FireEye solutions unites two powerful technologies to defend against APTs. The FireEye NX Series uses a unique, automated approach to test suspicious, executable files in a safe, virtual environment. Whe...
February 26, 2015
Organizer: FireEye Government Team at Carahsoft
Location: Webcast
Add Favorite
F5 Air Force TechTalk: Cybersecurity fo...
Earn (ISC)2 CPE credits and have a discussion on denial-of-serivce attacks, application security, and traffic inspection Join F5 Networks, VMware, CDWG, and Carahsoft to discuss how to operationalize application cybersecurity protections and L4-L7 services necessary to meet the performance, security and reliability demands of Air Force applications in a JIE environment. Learn how increase security, reduce complexity, and help the Air Force to...
February 26, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Lackland AFB, TX
Add Favorite
Managing the Migration to IPv6 Througho...

CANCELED

The Department of Defense has fallen behind in its transition from IPv4 to IPv6. A December 2014 report published by Department of Defense Inspector General (DODIG) indicates that the Defense Department is lagging in it’s adoption of IPv6 and needs to make it a priority for reasons of cyber security and for supporting it’s plans for future operations. The DODIG report finds that DOD has lacked a clear transition plan and coordinate...
February 25, 2015
Organizer: F5 Government Team at Carahsoft
Location: Webcast
Add Favorite
Fighting Cyber Threats with FireEye
Cyber attacks have changed dramatically. Ill-equipped with outdated defenses, government networks are routinely infiltrated by cybercriminals through blended attacks that exploit unknown vulnerabilities and steal valuable data - or worse. Many government and education organizations lack the resources, manpower, and visibility to effectively detect and combat today's advanced persistent threats. Please join FireEye and Carahsoft to learn how th...
February 24, 2015
Organizer: FireEye Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Adobe Solutions for eLearning & Virtual...
Join Adobe on Thursday, February 19th for an interactive seminar on how government agencies are leveraging Adobe solutions to deliver rich and engaging eLearning content. Developing and deploying an eLearning program can be a daunting challenge. Adobe Captivate and Adobe Presenter are powerful eLearning authoring tools used to create rich, engaging student interactions. Adobe Connect delivers this eLearning content through a secure platform, b...
February 19, 2015
Organizer: Adobe Government at Carahsoft
Location: McLean, VA
Add Favorite
Back to Search Begin New Search