Back to Search Begin New Search Save Search Auto-Notify
Five Reasons for Government Organizatio...
Five Reasons for Government Organizations to Consider Deploying Apache Hadoop Federal and state government organizations collect huge amounts of data, both structured and unstructured, every day. By capturing, organizing, and analyzing this data properly, government organizations may unlock new opportunities to improve their services across all areas of society. Join us for an overview of the Solix Big Data Suite and learn five ways how Apache...
December 9, 2014
Organizer: Solix Technologies at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
VMware NSX Exploration-Durham, NC
VMware and August Schell are hosting an exclusive NSX Exploration Session. This formal 2-day training will help you get prepared for network virtualization as your organization embarks on the Software Defined Data Center journey. Space is limited and attendance is on a first come, first served basis. Your attendance will be confirmed via email 7 days prior to the event. This technical session will highlight: NSX networking fundamentals Utilizi...
December 8-9, 2014
Organizer: VMware
Location: Durham, NC
Add Favorite
VMware NSX Exploration-San Diego, CA
VMware and August Schell are hosting an exclusive NSX Exploration Session. This formal 2-day training will help you get prepared for network virtualization as your organization embarks on the Software Defined Data Center journey. Space is limited and attendance is on a first come, first served basis. Your attendance will be confirmed via email 7 days prior to the event. This technical session will highlight: NSX networking fundamentals Utilizi...
December 8-9, 2014
Organizer: VMware
Location: San Diego, CA
Add Favorite
VMware NSX Exploration
VMware and August Schell are hosting an exclusive NSX Exploration Session. This formal 2-day training will help you get prepared for network virtualization as your organization embarks on the Software Defined Data Center journey. Space is limited and attendance is on a first come, first served basis. Your attendance will be confirmed via email 7 days prior to the event. This technical session will highlight: NSX networking fundamentals Utilizi...
December 3-4, 2014
Organizer: VMware
Location: Columbia, MD
Add Favorite
VMware NSX Exploration
VMware and August Schell are hosting an exclusive NSX Exploration Session. This formal 2-day training will help you get prepared for network virtualization as your organization embarks on the Software Defined Data Center journey. Space is limited and attendance is on a first come, first served basis. Your attendance will be confirmed via email 7 days prior to the event. This technical session will highlight: NSX networking fundamentals Utilizi...
December 1-2, 2014
Organizer: VMware
Location: Reston, VA
Add Favorite
A Risk-Based Approach to Threat Management
Join us to discover how federal, state and local, and commercial organizations are leveraging Haystax’s innovative threat management solutions. Haystax gives organizations an instant understanding of their at-risk environment, which allows them to be prepared, plan proactively, and coordinate responses during critical events and incidents. The presentation will highlight case studies from major customers and will include a live demonstra...
November 20, 2014
Organizer: Haystax Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Optimize, Accelerate, and Secure VDI to...
Explore solutions that enhance the performance of VDI over the WAN, while dramatically simplifying operational complexities. Learn about this approach that eliminates the need for point solutions by providing granular, policy-based, and context-aware access, and support for strong multi-factor authentication. Join F5 Networks and Carahsoft for a complimentary webcast that will cover the following: Building a scalable and extensible VDI Securin...
November 18, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Mining Anomalies to Secure Operational...
Securing networks increasingly requires the ability to collect, process, and understand large, continuous streams of network data. Three of the biggest challenges in securing networks are: (1) mining streams of event logs and network traffic to extract actionable information about the state of the network; (2) adjusting policies and configurations in response to changing conditions and threats;(3) having some assurance that the resulting netwo...
November 13, 2014
Organizer: Skytree Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
F5 for State and Local Government - Cov...
Protecting Web Applications and Sensitive Data in the Face of Evolving Security Threats In today’s complex security environment, the vast majority of attacks are exploiting vulnerabilities within applications at layers 4-7. Interestingly, the vast majority of security capital expenditures are being spent to strengthen the network at layers 2-4. These solutions often have some visibility and signatures at layer 7, but they lack the applic...
November 13, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Mitigating DDoS Attacks in Education, G...
As the magnitude of the distributed denial-of-service (DDoS) threat spectrum continues to evolve, K-12 and higher education IT departments, government, and healthcare continue to search for the best way to protect applications and data from increasingly sophisticated, well-coordinated attacks. The solution is a strategy that focuses on blocking such attacks, while also ensuring valid users have access to network and application resources. Joi...
November 12, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Back to Search Begin New Search