Back to Search Begin New Search Save Search Auto-Notify
Where is Your Confidential Data?
Where is Your Confidential Data? As the threat landscape continues to evolve, organizations face ever-increasing challenges with protecting their sensitive information from loss or theft. A comprehensive strategy for protecting sensitive information includes endpoint protection, encryption, and data loss prevention solutions. Learn how Symantec DLP Solution can help kick start an organization’s data loss prevention program. Join Symantec...
December 8, 2015
Organizer: Symantec Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Salesforce Analytics Cloud for Program...
Learn How Federal Agencies Use The Salesforce Analytics Cloud for Program and Case Management Insight and Action Have you been caught unaware of trends within your Program? Would you like to reduce case backlog and improve citizen service? Is it hard to report on your program, case, and citizen data or hard to pull together the big picture? Is it taking too long for others to provide you the reports, analytics, and insight you need? Join us to...
December 8, 2015
Organizer: Salesforce Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Software Analytics for Better App Perfo...
Hear Sean O'Neil share 1:1 insight on how his team, New Relic, and others got Healthcare.gov back on track! View our on-demand webcast to understand how we provide you with visibility for every step of your cloud journey and give you the information you need to migrate wisely. New Relic will help you get the most of your application's performance in the cloud so you can focus on the reason you went in the first place: innovation. This means re...
December 8, 2015
Organizer: New Relic Government Team at Carahsoft
Location: Webcast
Add Favorite
F5 | FireEye SPAWAR TechTalk
PKI Identity and Break & Inspect Please join F5 Networks, FireEye, and GuidePoint to learn and discuss how GuidePoint has leveraged F5 and FireEye to create a comprehensive security solution that combines application delivery infrastructure with advanced content security, including: network segmentation and policy management, protocol conformance, DDoS mitigation, SSL inspection, advanced threat protection, intrusion prevention, threat int...
December 7, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: San Diego, CA
Add Favorite
F5 Gov TechTalk SSL Break and Inspect
Join F5 Networks, World Wide Technology, Inc. and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for application cybersecurity protection in the data center. Learn which SSL/TLS standards are necessary to meet the new federal requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS...
December 3, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: St. Louis, MO
Add Favorite
BusinessObjects Administration Intellig...
Must-see Demo for BusinessObjects Business Intelligence Software Administrators Is it taking you forever to manage role-based access to your business intelligence software? When your auditor needs access controls updates, is it a pain to pull together all the documentation? When one of your users accidentally deletes a folder or report from their personal folder, how easy or fast is it to bring their content back? View our complimentary on-dem...
December 3, 2015
Organizer: SAP Government Team at Carahsoft
Location: Webcast
Add Favorite
What You Can't See Can Definitely Hurt You
Detecting Modern Cyber Attacks with User Behavior Analytics Most organizations are facing a dual cyber problem: on one hand their security products can’t detect modern insider or hacker attacks, and on the other, their analysts are overwhelmed by security alerts and can’t respond effectively to attacks after detection. User Behavior Analytics (UBA) is a breakthrough technique for detecting and responding to new cyber attacks. View...
December 3, 2015
Organizer: Exabeam Government Team at Carahsoft
Location: Webcast
Add Favorite
F5 Air Force TechTalk SSL Break and Inspect
Join F5 Networks and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for Application Cybersecurity protection in the Datacenter. Learn which SSL/TLS standards are necessary to meet the new DoD requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS designs to mitigate web-based App...
December 1, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Wright-Patterson AFB, OH
Add Favorite
Supercharge Your eDiscovery with EDA/LAW
In the last few years, the balance of power and expertise has shifted in the eDiscovery industry. Law firms that were previously the gate-keepers of eDiscovery software and expertise are quickly finding that more and more agencies are taking control of their own eDiscovery. With simple, easy-to-use and easy-to-deploy eDiscovery tools, in-house attorneys and litigation staff can begin to understand the scope of discovery, plan the case strategy...
November 17, 2015
Organizer: LexisNexis Government at Carahsoft Technology Corp.
Location: Virtual
Add Favorite
Google Road Show: Design IT Like Google
Please join us in person at the Google DC office on Tuesday, November 17, 2015 to learn more about how Google technology can be used to support enterprise strategies in your environment. Google and Carahsoft are bringing together a limited number of customers to exchange information with other federal agencies and contribute to improving Google’s offerings to you. Attendees will be able to: Explore the underlying technology and data fabr...
November 17, 2015
Organizer: Google Government Team at Carahsoft Technology Corp.
Location: Washington, DC
Add Favorite
Back to Search Begin New Search