61 webcasts found
+ 197 past events found
Back to Search Begin New Search Save Search Auto-Notify
AvePoint #WFHready Webinar
As government employees and contractors are all adjusting to the new normal of working from home, Microsoft Teams has become a critical component to ensuring remote worker productivity and mission continuity. How do employees maximize their time working from home with Microsoft Teams? How can IT fight content sprawl and still protect key mission data? What type of information is being stored in these teams (and is it backed up) and what polici...
Add Favorite
Understanding SASE: Why the Future of N...
Please join NetFoundry and Carahsoft to learn the key principles of SASE (Secure Access Service Edge) networks and how your agency can benefit from adopting this model. The digital transformation of businesses to an app-centric world reverses network and security service design conventions. This shift has caused individuals and/or teams responsible for security and risk management to look to a converged, cloud-native SASE to protect critical s...
Add Favorite
Splunk High-Performance Computing
Since the 1960s, supercomputers have played a critical role in countless scientific advancements. Traditionally, High-Performance Computing (HPC) was limited to exclusive groups such as university and government research. The commoditization of computer hardware experienced over the last decade has made HPC ubiquitous in its adoption. HPC is now mainstream and rapidly spreading across enterprises including academia, R1 institutions, banking, f...
Add Favorite
Amplify and Integrate Your Phishing Def...
Phishing attacks are relentless, and attackers continue to find creative ways to evade perimeter technologies such as Secure Email Gateways (SEGs). As malicious emails continue to reach user inboxes, there's increased risk of account compromise, data breach, and malware attacks, including ransomware. However, by combining training and human intuition with trusted intelligence, you will be able to reduce your organization's phishing threat expo...
Add Favorite
Transform Windows 10 with VMware Modern...
Windows 10 opens the door for you to transform siloed desktops, mobile device and application management, and adopt a unified approach across your organization with its new cloud-based management framework known as Modern Management. Modern Management represents a shift in the Windows management process to support the delivery of policies, updates, patches, and applications from the cloud. Windows 10 enables cloud-based delivery of security po...
Add Favorite
Remote Work with NVIDIA: GPU Accelerate...
As the public sector is called upon to address society's most pressing challenges, teleworking has become a crucial way for employees and contractors to maintain continuity and responsiveness. With NVIDIA Quadro RTX-powered laptops, virtual workstations, and cloud computing, you can tackle critical day-to-day tasks and compute-heavy workloads--from home or wherever you need to work. By attending this live CPE webinar, you'll learn: How the pow...
Add Favorite
Splunk: Driving Patient Privacy
Patient privacy is an ever-growing concern within our medical community. Join Splunk, True Zero Technologies, and Carahsoft to learn how Splunk uses data from all data sources to identify breach or leak incidents concerning ePHI.During this webinar, we will discuss how:Proactive measures and real time response to security breaches or unauthorized access attempts help ensure privacy of patient informationImplementing these protective measures h...
Add Favorite
5 Steps to Comprehensive Data and Threa...
Many state and local government entities face increasingly complex challenges when it comes to keeping important data secure. Today there are more users, devices, applications, and data outside the organizational datacenter than inside. This network inversion introduces new blind spots, leaving agencies vulnerable to a new crop of cloud-enabled and credential-based attacks. Please join Netskope for a webinar to discuss how Netskope has partner...
Add Favorite
Find the Malicious Code Hiding on Your...
80% of web pages contain at least one third party library security vulnerability. Script threats like web skimming, formjacking, and Magecart attacks can steal data from visitors to your website. Content from third party sources are increasingly becoming major attack vectors for script attacks, which take advantage of compromised web tools you need. Join Akamai and Carahsoft for a complimentary webinar on June 24th to learn how you and your ag...
Add Favorite
Protecting Government and Corporate Sup...
Supply chain complexity is rising, and the public and private sectors are stronger together. The resulting approach is called cyber collective defense, and it's changing how businesses and the federal government protect their supply chains.Join IronNet Cybersecurity, Amazon Web Services (AWS), and Carahsoft on June 25th for an insightful webinar on how a collective defense strategy allows federal agencies to:Better understand their threat land...
Add Favorite
Back to Search Begin New Search