Akamai Demo Desk
Interested in advanced threat protection at the DNS layer? Well you're in luck! Our team here at Carahsoft will help you understand how you can proactively protect the enterprise with Akamai Enterprise Threat Protector. Join this quick, 30-minute demo to get all of your security questions answered. Register now!
Okta | SailPoint Lunch and Learn
Let’s face it, it’s a complex world we work in. With diverse and dynamic users, numerous applications, and proliferation of data files, information security and regulatory compliance becomes a huge challenge for government agencies and educational institutions. End-to-end identity provides game-changing technology to cost-effectively manage sensitive data. Learn how to apply a holistic approach to improve information security while...
Cloudera Sessions - Washington D.C.
Join us for Cloudera Sessions 2018, where D.C.'s smartest data professionals will be discussing many of the newest use cases for machine learning and artificial intelligence (AI)--ranging from predictive maintenance and fraud detection to product recommendation engines and proactive customer support. Come gain firsthand experience into how experts like yourself are using data-driven insights to grow businesses, improve efficiencies, and manage...
VMware Richmond Public Sector Day
Join us on July 31 for VMware's first annual Richmond Public Sector Day! During our sessions, you will hear VMware subject matter experts as they discuss how their software-defined approach can enable your organization to implement a unified hybrid cloud and fully realize the mobility that is changing the landscape of government organizations today. Register today and join us in Richmond!
FireEye Webcast Discover the Future of...
Today's skilled attackers bypass the traditional endpoint defenses (firewall, antivirus software) that most security teams have relied on for years. Even when a traditional defense stops a known threat, it can't determine what that threat was trying to do. FireEye Endpoint Security (HX series) can be deployed on premise for endpoints inside and outside the corporate network. It helps your security team detect, contain, and understand the natur...
Symantec Web Isolation: Prevent Malware...
View our complimentary on-demand webcast to hear Chad Knupp, Sr. Federal Systems Engineer - Symantec, discuss some of the key benefits of Symantec Web Isolation, including: The highest level of isolationSuperior user experienceCloud, on-prem, and hybrid offeringsGranular control over user activitiesTight integration with Symantec products
Remove Security Blind Spots with the Sy...
View our on-demand webcast to learn about how the SSL Visibility Appliance, the leading purpose-built appliance for encrypted traffic management, can help your agency: Enable secure SSL/TLS inspection and preserve data integrityImprove the ROI of your entire security infrastructurePreserve privacy and compliance with selective decryption
The Cybersecurity Landscape for Higher...
View our on-demand webinar to hear from Palo Alto Networks' Chief Technology Officer, Rick Howard, about the evolution of network defense for higher education. Rick discusses the cybersecurity shortage and how higher education could capitalize on filling this gap in the cybersecurity landscape.
Proofpoint Webcast: Emerging Threats In...
View this on-demand webinar to review how to: Keep pace with dynamic threat landscape using continuously updated intelligenceBlock attacks and campaigns before they reached their organizationIncrease the dependability of their existing security infrastructure with simple and easy to consume data setsAdopt a proactive security posture based on real intelligenceVerify their prevention devices were performing as advertised by looking for the...
Getting Ahead of the Adversary - Splunk...
View our on-demand webinar to hear from John Stoner, Principal Security Strategist at Splunk, and Anthony Talamantes, Manager of Defensive Cyber Operations at Johns Hopkins University Applied Physics Lab,and learn how to: Proactively hunt threats to minimize impact to the missionIngest and search against unique government developed threat intelligence and other sources of indicators of compromise (IOCs) Detect malicious activity within and ac...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.