Back to Search Begin New Search Save Search Auto-Notify
Protect Your Data: The Latest in Databa...
As you provide access to critical business data, you also open the door for your largest potential security threat - your employees. Cyber attacks continue to change rapidly but their ultimate goal remains the same - to steal your data. Join Carahsoft and Imperva to learn the latest in database protection, machine-learning, and behavior analysis, including: Database Security Tools: Database scanning, privileged user monitoring, and firewall B...
April 28, 2016
Organizer: Imperva Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
U.S. Cyber Adversaries: Tactics and Tec...
Join us for a presentation that will interpret nation-state threat actors and their techniques. We will analyze the rapidly evolving but highly contested domain of warfare: cyberwar. We'll define the various advantages that nation-states reap by embracing cyberwar and we'll contrast advancements in cyber with other technological and military achievements throughout history in order to measure the significance cyber is and will be playing in th...
April 28, 2016
Organizer: Securonix Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Protecting Your Sensitive Databases
Uncover Database Weaknesses with DbProtectEvery government agency is undoubtedly concerned about keeping outside attackers away from its sensitive data stored in databases, but understanding who has access to that data from within the organization can be an equally challenging task. The goal of every attacker is to gain privileged access. An excessively privileged user account can be used as a weapon of destruction in the enterprise, and if t...
April 28, 2016
Organizer: Trustwave Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Best Practices for Protecting High Valu...
OMB's Cybersecurity Strategy and Implementation Plan (CISP) underscores the need for agencies to implement a defense in depth strategy to protect their high value information and assets, especially sensitive data, sensitive keys, and identity credentials. Sensitive data-at-rest is generally the most vulnerable once a breach has occurred, because of its volume and relevance. Attackers far too often hijack privileged accounts with full access to...
April 26, 2016
Organizer: SafeNet Assured Technologies
Location: Webcast
Add Favorite
Transform Your Organization with Hyper-...
VMware Hyper-Converged Infrastructure (HCI) is quickly transforming the way agencies build and manage their datacenter and IT infrastructure. New organizational requirements are encouraging many technology leaders of the future to embrace recent innovations in computing like VMware Hyper-Converged Software (HCS), now tightly integrated with EMC hardware, and available as a single appliance solution, VxRail. Agencies are rapidly investing in H...
April 21, 2016
Organizer: VMware Government Team at Carahsoft
Location: Webcast
Add Favorite
Adobe Connect for eLearning & Virtual M...
Please join Adobe on Wednesday, April 20th for an interactive seminar on how organizations across the U.S. are leveraging Adobe Connect to communicate instantly, and deliver rich and engaging eLearning content.Adobe Connect delivers virtual eLearning solutions which reduce the cost of in-person activities, and make collaborative sessions possible and more productive. With Adobe Connect, you can easily reuse content, courses, and curriculums, t...
April 20, 2016
Organizer: Adobe Government at Carahsoft Technology Corp.
Location: Oklahoma City, OK
Add Favorite
Creating Compelling Experiences
From Content Creation to Service Enrollment & DeliveryShaped by every day, immersive digital interactions, citizens and employees expect the same type of experience from the public sector that they get from the private sector. Poor online interactions push people to more time-intensive and expensive in-person interactions. Beyond, the cost, people expect online and offline communication to be personalized, efficient and connected.In order...
April 19, 2016
Organizer: Adobe Government at Carahsoft Technology Corp.
Location: Raleigh, NC
Add Favorite
Tagging, Tracking, and Knowing Your Targets
One of the great pains in working with geospatial data is locating and understanding the countless systems and files where that information resides. The time spent searching and managing the data can delay time to action and ultimately hinder making real-time decisions. Enter a technological cure -- MarkLogic has developed a Geo360 solution that alleviates the pain of working with geospatial data. Our solution is a single Enterprise NoSQL dat...
April 19, 2016
Organizer: MarkLogic Government Team at Carahsoft
Location: Webcast
Add Favorite
Creating Compelling Experiences
From Content Creation to Service Enrollment & Delivery Shaped by every day, immersive digital interactions, citizens and employees expect the same type of experience from the public sector that they get from the private sector. Poor online interactions push people to more time-intensive and expensive in-person interactions. Beyond, the cost, people expect online and offline communication to be personalized, efficient and connected. In orde...
April 14, 2016
Organizer: Adobe Government at Carahsoft Technology Corp.
Location: Tallahassee, FL
Add Favorite
How Strategic Sourcing's Enterprise Sof...
Here’s your chance to hear the contract facts from someone in your own agency! Shantelle Coleman Branch Manager, DHS – Office of the CIO, will be discussing how you can quickly plan, procure, and deploy your agency’s virtualization and cloud solutions through the recently established DHS | VMware BPA (contract # HSHQDC-11-A-00041). Join us as we reveal how DHS’ Strategic Sourcing’s Enterprise Software Solutions ca...
March 28, 2012
Organizer: VMware Government at Carahsoft Technology Corp.
Location: Reston, VA
Add Favorite
Back to Search Begin New Search