Cloud Core Network Service and Security...
Today, roughly 80% of all enterprises are highly virtualized - taking advantage of efficient resource utilization, agility, and reduction of overall IT costs of public, private, and hybrid cloud infrastructure. These organizations must not overlook the criticality and the cost benefits of automating key network tasks. Infoblox solutions enable such organizations to fully automate their virtual and cloud infrastructure, while seamlessly integr...
Salesforce Customer Success User Group...
Salesforce experts will provide guidance on developing a best practice approach to transitioning to Lightning, discuss key product features and benefits, and leave you with recommendations on how to create and execute your Salesforce Lightning Migration Plan. Tentative Schedule:2:00 - 2:30pm Registration and Opening Remarks2:30 - 4:00pm Customer Success Topic & Roundtable Discussion4:00 - 6:00pm Optional Cash Bar Reception & Network...
Carahsoft Government, Education, ...
Join Carahsoft and the VMware Government, Education, and Healthcare teams on Monday, August 27, following the conclusion of Monday's VMworld events at Aureole for drinks, hors d'oeuvres, and networking. This event is only open to VMware U.S. government, education, and healthcare customers with VMworld passes. You must bring your VMworld badge at the time of the event to enter.
Akamai Demo Desk Virtual Event
Interested in advanced threat protection at the DNS layer? Well you're in luck! Our team here at Carahsoft will help you understand how you can proactively protect the enterprise with Akamai Enterprise Threat Protector. Join this quick, 30-minute demo to get all of your security questions answered. Register now!
Atlassian Summer Sessions: Service Mana...
Government agencies face many unique service management challenges. As agencies deliver mission-critical functions and services, many look to IT Service Management (ITSM) practices to guide them. With the help of Atlassian tools, teams provide quality, knowledge-centric support while improving overall collaboration. We invite you to register for our third exclusive Atlassian Summer Session on-demand webcast. Listen to Atlassian's very own ITSM...
Save Time and Money on Mobile Field Dat...
Cost and ease-of-use are prominent issues that arise while collecting mobile field data. Spike by ikeGPS is a cost-effective and easy-to-use smart laser measurement solution that also integrates with Esri's ArcGIS. Join our complimentary webinar and learn how to inspect, assess, and report assets and features, simply by taking a photo with a smartphone or table and the Spike laser device. From this photo, you can measure areas, heights, widths...
Mastering Mobile Security with BlackBer...
Mobile devices are critical to every organization's digital transformation initiative, but for hackers set on stealing sensitive business data, mobile devices are the new back door to the enterprise network. In fact, 20% of all businesses were breached last year and an even larger number has no idea whether they've experiences a mobile attack, according to a recent survey conducted by Dimensional Research. You're invited to view our on-demand...
Simplify IT Procurement with the VMware...
The US Army CIO/G-6 has significantly simplified and expanded the Army's access to VMware technology through the US Army ELA. This contract between VMware and the US Army will enable IT transformation and support alignment with the Army IT modernization and DoD Joint Information Environment initiatives. During this webcast John Jordan, Army ELA Program Manager at VMware, the CIO/G-6, and the Carahsoft Army Team will discuss: VMware virtualizat...
Okta | SailPoint Lunch and Learn
Let’s face it, it’s a complex world we work in. With diverse and dynamic users, numerous applications, and proliferation of data files, information security and regulatory compliance becomes a huge challenge for government agencies and educational institutions. End-to-end identity provides game-changing technology to cost-effectively manage sensitive data. Learn how to apply a holistic approach to improve information security while...
BlackBerry Breakfast Briefing
Mobile devices are critical to every organization's digital transformation initiative. But for hackers set on stealing sensitive business data, mobile devices are the new back door to the enterprise network. In fact, 20% of all businesses were breached last year and an even larger number has no idea whether they've experienced a mobile attack, according to a recent survey conducted by Dimensional Research.You're invited to spend time with Blac...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.