Back to Search Begin New Search Save Search Auto-Notify
Google Cloud October Webinar Series: As...
Join Google Cloud and Carahsoft for a deep-dive webcast on VM Migration. We plan to walk you through what an assessment of your on-prem environment would look like, how we do the assessment, and the immediate value you get out of it. From there, we will go in-depth on some customer scenarios that have already gone down this path with us. We will discuss how those customers chose to first adopt the cloud, based on their business needs and chall...
Add Favorite
McAfee's New Capabilities for NIH Webinar
National Institutes of Health’s mission is to seek fundamental knowledge about the nature and behavior of living systems and the application of that knowledge to enhance health, lengthen life, and reduce illness and disability. They have identified Cyber Security as a key, strategic initiative needed to protect the personal information of the customers they serve. NIH desires an industry-leading platform approach that offers scalability,...
Add Favorite
Web Application Firewall (WAF) and DDoS...
Join F5 Networks and Carahsoft for a webinar where we will discuss how your organization can deploy managed security services for every application, anywhere, without upfront investments in IT infrastructure and support. With F5's fully-managed Web Application Firewall (WAF) and DDoS Protection services, you'll be protected against the 10 most common web application attacks, malicious bots that consume valuable resources, and DoS attacks.F5's...
Add Favorite
Crimeware via Email: Recent Trends and...
Destructive and criminal malware attacks are continually finding new ways to evade security defenses. ReversingLabs has thorough experience in analyzing these threats. Join our webinar and discover recent malware threats, how they remain undetected, and how you can strengthen your security environment with increased confidence in your detection. We will show you how you can reduce the time to identify and respond when trouble hits. During this...
Add Favorite
Get Ahead of Ransomware with Splunk & AWS
From medical record systems to public transportation infrastructure, the onslaught of recent ransomware attacks has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of these attacks shows that ransomware is a greater concern that affects all of IT.How can you better prepare and respond to such threats?Join us and learn how to apply broader analytical approach and data-driven...
Add Favorite
Splunk Webinar Series: To the Basics an...
Curious about how Splunk can help your organization? Join us for this informative on demand webcast series where we will discuss a variety of topics ranging from Splunk 101, machine data, IT operations, security, and more. This series will provide a wide overview of how you can leverage your machine data, gain real-time insights, and make smarter business decisions within your agency. There's An App for That: Splunk Security Essentials Your or...
Add Favorite
Enhance Your Security Posture with Info...
Cybercrime is growing in complexity and scale, but security teams cannot respond to incidents fast enough. Improved response times requires multiple stakeholders, better information and processes. Throwing more people at the problem is not possible, nor the correct solution. Implementing and integrating security tools that allow you to simplify, do more with less and build adaptive security architectures to protect your critical infrastructure...
Add Favorite
Get Ahead of Ransomware with Splunk & AWS
From medical record systems to public transportation infrastructure, the onslaught of recent ransomware attacks has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of these attacks shows that ransomware is a greater concern that affects all of IT.How can you better prepare and respond to such threats?Join us and learn how to apply broader analytical approach and data-driven...
Add Favorite
Root Process Protection through Encrypt...
You are invited to our live webinar with Thales on November 19th where we will take a data-centric security approach to the discussion beginning with the application stack and highlight where and why industry best practices for encryption, policy, and access controls can be applied. Join us to learn about Thales' Root Process Protection through Encryption within Docker-Kubernetes. We'll cover protecting structured and unstructured data at rest...
Add Favorite
Addressing Malware: A Layered Security...
What do the City of Albany, City of Atlanta, City of Baltimore, Cleveland Hopkins International Airport, North Carolina's Onslow Water and Sewer Authority, and The United States Department of Homeland Security have in common?Ransomware.We've all heard of ransomware before, but how do we understand the associated risks and prevent it, given limited resources? If your organization believes it could be better protected against ransomware, join Ca...
Add Favorite
Back to Search Begin New Search