Back to Search Begin New Search Save Search Auto-Notify
How to Implement an Effective Zero Trus...
The rapid adoption of IoT devices, cloud infrastructures, the recent expansion of remote workforces, and the increased execution of service contracts with multi-tier contractors have created massive distributed IT networks placing more emphasis on Zero Trust approaches. These distributed environments display increased attack surface areas, creating multiple entry points for adversarial actors to penetrate and potentially own a technology ecosy...
Add Favorite
VMware Virtual Power Block Sessions
VMware and Carahsoft would like to offer you the opportunity to attend a variety of sessions on all of the topics you and your agency care about. Throughout the month of June, we are providing short sessions on: What's New in VMware vSAN 7 VMware Carbon Black Application Control Disaster Recovery in the Software-Defined Datacenter using vSAN and SRM Rubrik Sizing for Hyperconverged on vSAN VMware Bitfusion VMware vRealize Code Stream VMware vS...
Add Favorite
Find the Malicious Code Hiding on Your...
80% of web pages contain at least one third party library security vulnerability. Script threats like web skimming, formjacking, and Magecart attacks can steal data from visitors to your website. Content from third party sources are increasingly becoming major attack vectors for script attacks, which take advantage of compromised web tools you need. Join Akamai and Carahsoft for a complimentary webinar on June 24th to learn how you and your ag...
Add Favorite
Splunk 101 for Nonprofits
Join Splunk & SGT and learn how Splunk for Good helps nonprofits secure their data infrastructure, ensure operational efficiency, and create new innovative solutions that power their overall mission. Splunk for Good transforms the connective power of data into a strategic asset for nonprofits, universities, organizations, and people working to do good in the world. Through expertise, tools, training, and personalized support, we help simpl...
Add Favorite
Splunk ESI Contract and DoD
DoD has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to DoDHow to leverage the contractDon't miss out. Registe...
Add Favorite
VMware Virtual Power Block Sessions
VMware and Carahsoft would like to offer you the opportunity to attend a variety of sessions on all of the topics you and your agency care about. Throughout the month of June, we are providing short sessions on: What's New in VMware vSAN 7 VMware Carbon Black Application Control Disaster Recovery in the Software-Defined Datacenter using vSAN and SRM Rubrik Sizing for Hyperconverged on vSAN VMware Bitfusion VMware vRealize Code Stream VMware vS...
Add Favorite
Bridging Secure Remote Application Acce...
Even as states begin to re-open after being closed for weeks due to the COVID-19 coronavirus, the government workforce and contractors will continue to work from home or remotely for the foreseeable future. They require secure remote access to applications to be productive. While applications have migrated to the public cloud or have been replaced by SaaS applications, there remain many applications that cannot be migrated or replaced. These m...
Add Favorite
VMware Solutions to Enable a Zero Trust...
Join VMware and Carahsoft for a webcast to learn why zero-trust security is top of mind for organizations more than ever due to COVID-19. The pandemic is driving organizations to re-think how they keep staff productive and supporting the mission with compromising sensitive data and assets. During this webcast, attendees will gain an understanding of why traditional "castle and moat" architectures can be disastrous and how implementing a zero-...
Add Favorite
Transform Endpoint Security with VMware...
In 2020, cyber defenders have seen a high level of innovation from cybercriminals, who are leveraging new tactics, techniques, and procedures (TTPs) to maintain persistence and counter incident response efforts. At an alarming rate, transnational organized crime groups and spies are leveraging cybercrime tools and services to conduct a wide range of crimes against government agencies and financial institutions. Criminals are increasingly shari...
Add Favorite
Gaining More Visibility and Security fo...
In this current disruptive economy situation, security and visibility are the top concerns for government agencies to re-open the economy. With deep expertise in both cloud strategy and security, Kapstone is offering a complete and holistic cloud security and analytics solution that addresses controls, technology, and continuous governance to deliver a secure and compliant cloud that meets regulatory needs and concerns. Join us on Tuesday, Jul...
Add Favorite
Back to Search Begin New Search