Back to Search Begin New Search Save Search Auto-Notify
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. Join Splunk and FCN for an on demand presentation and demo on the broad strokes of Splunk Phantom's automation engine. During th...
Add Favorite
Accelerate Security, Agility, and Visib...
Maintaining physical, on-prem servers can be expensive. Between the hard cost of on-prem equipment and the soft labor cost to maintain these systems, it's no wonder that more businesses are taking their holistic digital ecosystem to the cloud.View this on-demand webinar supporting your cloud migration efforts. As more critical workloads move to AWS, you need to gain critical security, operational, and cost management insights across your entir...
Add Favorite
Adobe Digital Government Technology Con...
Adobe and Carahsoft invite you to join us for the 2019 Adobe Digital Government Technology Conference to discover how Adobe is leading in digital transformation across federal, state, and local agencies. This year's conference will feature sessions geared around digital government and customer experience (CX) best practices through tactical learning tracks covering web modernization, outreach and engagement, forms and document transformation,...
Add Favorite
SOAR Into Advanced Cyber Defense with S...
Join Splunk and Carahsoft for a presentation and demo where we will discuss how Splunk Phantom can help your team achieve optimum security operations regardless of what security tools or SIEM you're using. Through Splunk Phantom, users will be able to leverage technology for orchestration and automation as an integral part of their Security Operations Center (SOC) platform to accelerate incident response while addressing the skills shortage. T...
Add Favorite
The Future of Encrypting Network Data
High-speed data networks are not inherently secure. Public and private network infrastructure are exposed to a multitude of cyber-threats, and with the rapid growth of IoT, Virtualization, Big Data Applications, Cloud, and Data Centric Services, the need for high data volume (100Gbps+ links) networks to securely deliver information when and where we need it has increased. Thales Trusted Cyber Technologies, offers a network security solution th...
Add Favorite
Safeguarding Sensitive and Compliant Da...
Join us for a complimentary webinar on April 23rd to discuss how Thales TCT and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solutions to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file-level access control, encryption, and key management are substantia...
Add Favorite
Security Awareness Training Webinar
With the rise of remote working, agencies are more vulnerable than ever before. Since over 90% of attacks originate from emails and countless breaches are caused by human error, it's crucial to engage your end-users and create a culture of security awareness. Proofpoint's people-centric approach to security will transform your end-users from risky to ready, creating a formidable last line of defense against phishing and ransomware attacks. We'...
Add Favorite
Understanding SASE: Why the Future of N...
Please join NetFoundry and Carahsoft to learn the key principles of SASE (Secure Access Service Edge) networks and how your agency can benefit from adopting this model. The digital transformation of businesses to an app-centric world reverses network and security service design conventions. This shift has caused individuals and/or teams responsible for security and risk management to look to a converged, cloud-native SASE to protect critical s...
Add Favorite
Splunk High-Performance Computing
Since the 1960s, supercomputers have played a critical role in countless scientific advancements. Traditionally, High-Performance Computing (HPC) was limited to exclusive groups such as university and government research. The commoditization of computer hardware experienced over the last decade has made HPC ubiquitous in its adoption. HPC is now mainstream and rapidly spreading across enterprises including academia, R1 institutions, banking, f...
Add Favorite
Navigating the Security Maze of the Rem...
With the outbreak of COVID-19, the demand for remote work has increased exponentially. Working from home presents a different set of cybersecurity challenges with most home offices having off-the-shelf routers with minimal security countermeasures. The new remote work and remote learner environments provide attackers with a new entry point which they can exploit more easily than the well-defended network used in the past. Leveraging malware po...
Add Favorite
Back to Search Begin New Search