Back to Search Begin New Search Save Search Auto-Notify
Securing JIE/JRSS Alignment - Alabama
Secure Your Resources, Simplify Authentication, and Consolidate Infrastructure in a Joint Environment - While Maintaining Command and Control of Your Applications Authentication, application security, remote access, and application portability (IPN, milCLOUD, CDC’s, public cloud) are challenges when preparing an environment to support consolidation, Joint Information Environment efforts, and coalition/mission partner users. F5 improves a...
March 11, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Gunter AFB, AL
Add Favorite
F5 Air Force TechTalk: Cybersecurity fo...
Earn (ISC)2 CPE credits and have a discussion on denial-of-serivce attacks, application security, and traffic inspection Join F5 Networks, VMware, CDWG, and Carahsoft to discuss how to operationalize application cybersecurity protections and L4-L7 services necessary to meet the performance, security and reliability demands of Air Force applications in a JIE environment. Learn how increase security, reduce complexity, and help the Air Force to...
February 26, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Lackland AFB, TX
Add Favorite
Managing the Migration to IPv6 Througho...

CANCELED

The Department of Defense has fallen behind in its transition from IPv4 to IPv6. A December 2014 report published by Department of Defense Inspector General (DODIG) indicates that the Defense Department is lagging in it’s adoption of IPv6 and needs to make it a priority for reasons of cyber security and for supporting it’s plans for future operations. The DODIG report finds that DOD has lacked a clear transition plan and coordinate...
February 25, 2015
Organizer: F5 Government Team at Carahsoft
Location: Webcast
Add Favorite
Analyze, Search, and Tag Images, Video,...
The government collects image, video, sensor, and other pixel content. Text search engines have no ability to review, search, or analyze this content. piXlogic changes all that and provides the analytics and search capabilities to examine image, video, and pixel content for any object, face, and text in the image of interest. Whether you are law enforcement trying to analyze surveillance and social media content or you are intelligence and def...
February 3, 2015
Organizer: piXlogic Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
The Future of Army National Guard Data-...
Many defense organizations lack a comprehensive Business Intelligence (BI) solution due to the explosion in enterprise data, and others still only use BI to create and run reports. It’s now possible to make better defense decisions, with the addition of innovative abilities in the latest BI software. Drive Your BI Strategy ForwardToday, leading defense organizations are using BI to find answers "in the moment" by seizing opportunities an...
July 29, 2014
Organizer: SAP Government Team at Carahsoft
Location: Webcast
Add Favorite
Network Metadata: Exposure Risks and Remedies
Network Metadata: Exposure Risks and Remedies High Speed Network Encryption Webinar Series Ethernet encryption mitigates communication exposure but its associated metadata can be intercepted in order to deduce patterns through traffic analysis. These patterns are often just as useful to hackers as the data itself. To guard against the risks associated with malicious traffic analysis, agencies need to leverage an approach known as transmission...
June 2, 2014
Organizer: SafeNet, Inc.
Location: Webcast
Add Favorite
Addressing Insider Threat Through Secur...
Following the Snowden and the Navy Yard incidents, insider threat has become a growing concern with the leadership in Defense, Intelligence, and Civilian agencies. Lack of consistent visibility across cybersecurity, physical security, and operational technology results in hidden, complex blended threats and no clear picture of the risks posed by individuals. A single insider can cause more damage in less time required. As systems are interconn...
May 28, 2014
Organizer: SAP Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Optimizing Asset Management: A Predicti...
Clockwork Solutions, LLC provides predictive analytics software for strategic enterprise asset management. We enable A&D (Aerospace and Defense) and federal organizations to save a significant amount of operation and sustainment costs for a variety of assets including command and control equipment, fixed wing aircraft, helicopters, weapons systems, ground vehicles, and surface ships. View our complimentary on-demand webcast as we discuss h...
May 22, 2014
Organizer: Clockwork Solutions Government Team at Carahsoft
Location: Webcast
Add Favorite
Fourth Annual Government Big Data Forum
Dan Doney, Chief Innovation Officer for the Defense Intelligence Agency (DIA), will deliver the morning keynote at this year's event. Doney will explore the Big Data challenges facing the DIA and other elements of the Federal Government. He will also highlight how new technologies, related to Big Data, are creating new opportunities for technical breakthroughs, and the principles that DIA is using to foster technical innovation and put ideas i...
March 19, 2014
Organizer: Big Data Government at Carahsoft
Location: Washington, DC
Add Favorite
Third Annual Citizen Engagement Seminar
Save the Date! Many government agencies have already developed creative and interactive programs to extend their outreach to the public, such as the Department of Defense’s latest update to their Social Media Handbook, and the Center for Disease Control’s informational zombie apocalypse games. Carahsoft's Third Annual Citizen Engagement Seminar on June 6th will build upon the open government conversation; specifically how your agen...
June 6, 2013
Organizer: Carahsoft Technology Corp.
Location: Washington, DC
Add Favorite
Back to Search Begin New Search