Imperva’s Bot Management Overview
Imperva Bot Management (formerly Distil Networks) protects your websites, mobile applications, and APIs from automated threats without affecting the flow of business-critical traffic. It’s a key component of our integrated single-stack architecture that takes defense-in-depth to a new level. Join our subject matter expert and VP of Bot Mitigation, Tiffany Kleemann, to learn about Imperva Bot Management and how it will help you offer a de...
SIEM Alignment to NIST 800-53 and Use C...
Join Exabeam for an informative discussion on how the guidelines spelled out by the National Institute of Standards and Technology (NIST) 800-53 impact public universities, colleges, and K-12. Register today to explore your EDU technology with Exabeam! In this webinar, attendees will learn about: The need for centralized logging, incident response, and compliance reporting NIST 800-53 control families and overview Full smart SIEM and UEBA to a...
Enabling the Army Mission with Decision Lens
Whether you are responsible for who to recruit, what they should be trained on, or how to allocate resources for that training, Decision Lens can assist in your readiness planning. Decision Lens is a cloud-based product designed to help DoD organizations streamline planning, efficiently set priorities, and smartly allocate resources. Currently Decision Lens is being used across numerous Army organizations including TRADOC to support requireme...
Software-Defined Data Center: The Found...
Join VMware and Carahsoft to learn how you can innovate freely in the cloud of your choice with the VMware software-defined digital foundation. Built on our industry-leading technologies, our approach brings together best-in-class virtualized computing, storage, and networking with comprehensive cloud management. Our common operating environment lets you rapidly run, manage, connect, and secure apps across data centers, clouds, and devices. Du...
Kofax at Gartner IT Symposium
If you're heading to the Gartner IT Symposium/Xpo in October, connect on-site with Kofax to discuss your unique Intelligent Automation path. Schedule an appointment to meet with Kofax executives now: • Kathleen Delaney, Chief Marketing Officer • Chris Huff, Chief Strategy Officer • Mike Chasteen, Sr. Vice President of Sales Intelligent automation boosts your productivit...
Three Critical Components for Effective...
Some of the most notorious and damaging security breaches happen in minutes. Did you know that they actually began months - if not years - in advance by the perpetrators? Advanced Persistent Threats (APTs) are considered to be the most dangerous and challenging to detect and defend because of the volume, variety, and velocity of data required to find them - as well as the amount of time and special attention required to catch them. Your advers...
Why Advanced Application Threats Requir...
Join F5 for a Hands-On-Lab to hear about F5's Advanced Web Application Firewall (WAF), a new category of app protection that introduces unique capabilities to the WAF market. Web application attacks are the #1 source of data breaches. A WAF provides critical security controls to protect web apps. However, not all WAF solutions are made equally. While many can help an organization protect their apps from common and known threats, most are inade...
Salesforce Basecamp for Government Cara...
At Carahsoft, we work with Salesforce to increase customers' and citizens' experience with government and wanted to extend an invitation to their upcoming reception. Join us immediately following the Salesforce Basecamp for Government for a complimentary networking reception. Spend the evening of October 16th to network with peers in your industry over hors d'oeuvres and an open bar. The reception will take place at Claudia's - a quick 4 minut...
Sacramento Public Sector User Group
Not too long ago, the State of California, like many other state governments, had to suffer through manual, slow, expensive, and error-prone agreement processes. As a valued customer, our goal is to continue to help you eliminate paper, automate processes, and inject DocuSign into other technologies that you are currently using.DocuSign invites you to join us for a full-day of learning, best practices, and working sessions with DocuSign subjec...
Ransomware Prevention
Join F5 Networks and Carahsoft for a hands-on lab to learn about one of the most significant cyber-threats to date: ransomware. Experts agree that a multi-faceted and holistic strategy is the best defense. We will discuss actionable steps you can take to identify, prevent, detect, respond, and recover from a ransomware attack. We will also discuss the three primary attack vectors used to deliver ransomware and how F5 solutions can be directly...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.