Cipher Summit 2019
Save the date for our SafeNet AT 2019 Cipher Summit! Attendees will hear from their peers, industry pundits, and technology experts about the current federal cyber security landscape and learn about the solutions needed to help solve the most pressing security issues.This one-day event will also feature technical sessions designed to help SafeNet AT customers' better leverage their current solutions and provide a forum for interactive discussi...
Adobe Digital Government Technology Con...
Adobe and Carahsoft invite you to join us for the 2019 Adobe Digital Government Technology Conference to discover how Adobe is leading in digital transformation across federal, state, and local agencies. This year's conference will feature sessions geared around digital government and customer experience (CX) best practices through tactical learning tracks covering web modernization, outreach and engagement, forms and document transformation,...
Infinera Live Virtual Federal Tradeshow
Teleworking and telecommunication networks have become a necessity in helping people stay connected and productive. With the cancellation of trade shows and restrictions on face-to-face interaction, it has become harder to stay up-to-date on the latest networking innovations.Infinera is leading the industry with their latest revision of the Infinate Capacity Engine (ICE6) delivering unbreakable records in both capacities and reach. XR Optics d...
Why Mezzanine Helps Achieve the Best Si...
With teams distributed around the country, federal agencies need to collaborate effectively. Remote meetings are the new standard, and they require participants to share and view content in real-time. With current collaboration solutions, only one person can share content at a time, resulting in poor engagement and making situational awareness difficult. Oblong's Mezzanine solution allows you to share 10 live streams of information simultaneou...
Cloud Delivered Network Security with P...
Existing networking and network security architectures no longer meet the needs of enterprises in the new world of hybrid work. It's time for a new approach, the Secure Access Service Edge (SASE). However, to be effective, a successful SASE strategy must converge best-of-breed SD-WAN and security capabilities in the cloud to deliver exceptional user experiences while reducing security risk. During this webinar, we will explore how three key th...
FortiGate Workshop
Today's networks are highly complex environments with borders that are constantly changing. In response, firewalls have become robust multi-functional devices that counter an array of threats to your network. Join Fortinet and Carahsoft for a complimentary workshop on how to install FortiGate and use it to protect a network. FortiGate enables security-driven networking and consolidates industry-leading security capabilities, such as SSL inspec...
Securing the Convergence of HPC and AI...
High-performance computing (HPC) has long expanded from research labs to commercial use. Computational modeling and simulation along with high-performance data analytics using HPC systems are prevalent in industries from the design and manufacturing of aircrafts to consumer goods, life sciences, energy, and financial services. The emergence of artificial intelligence (AI) and its symbiotic relationship with HPC has augmented traditional method...
Network Automation with F5 NGINX ...
Red Hat's Ansible Automation platform is the leading enterprise-ready automation platform helping network operators save time and reduce risk. Traditional approaches to network configuration can slow applications and make them prone to errors. Simple, powerful, agentless, and proven, Ansible Automation Platform brings network automation to the enterprise, adding the features and functionality needed for team-based automation at scale. Join us...
Threat Hunting Masterclass Session 1: H...
In the first session of the Threat Hunting Masterclass you’ll learn: How to properly understand and fully maximize your use of the tools and technologies behind threat hunting How to uncover common pitfalls and paradigms that are present when doing advanced threat hunting in live environments A view from the front: what works, and what needs refinement when everything is moving inside a customer environment.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.