Google Cloud Webinar Series: Augment Em...
Please join Google Cloud and Carahsoft for a webinar to demonstrate capabilities both within G Suite and Google Cloud Platform to detect, identify, and remediate end-user security events. Learn how public sector entities can respond to successful phishing attacks that impact other assets on the network, and take Google's approach in isolating the attack vector. During this webinar, you will learn about: End-to-end incident management, from end...
Security Awareness Training Webinar
With the rise of remote working, agencies are more vulnerable than ever before. Since over 90% of attacks originate from emails and countless breaches are caused by human error, it's crucial to engage your end-users and create a culture of security awareness. Proofpoint's people-centric approach to security will transform your end-users from risky to ready, creating a formidable last line of defense against phishing and ransomware attacks. We'...
Securing Your Data: The New Currency of...
Data is now currency for nation states, criminal organizations, and bad actors. They all want your data to sell to the highest bidder and your data could hold personal information, state secrets, or proprietary data. Please join Trustwave Government Solutions and learn more about the securing of crown jewels. During this webinar, you will have the opportunity to learn about: Data Security best practices for securing your databases Toxic Combin...
Work from Home with Dell Technologies a...
As remote work becomes a reality for organizations worldwide it is imperative that IT departments not only focus on tasks like PC deployment, help desk requests, and monitoring and troubleshooting, but also transformation of the end user experience. Dell's Unified Workspace gives employees a frustration-free, ready-to-work experience while enabling IT with automated, open, and intelligent solutions for unified management. With VMware Workspace...
AvePoint #WFHready Webinar
As government employees and contractors are all adjusting to the new normal of working from home, Microsoft Teams has become a critical component to ensuring remote worker productivity and mission continuity. How do employees maximize their time working from home with Microsoft Teams? How can IT fight content sprawl and still protect key mission data? What type of information is being stored in these teams (and is it backed up) and what polici...
Security Vulnerabilities & Protection i...
As our digitally connected government migrates to unprecedented levels of remote work, maintaining a robust cyber posture and proactively countering threats is imperative not only to protect sensitive citizen data but also to ensure uninterrupted essential service delivery.Join Flexera to hear from digital experts across federal government and defense communities discuss the most-pressing issues of today, including:Innovation of obsolescent ha...
Understanding SASE: Why the Future of N...
Please join NetFoundry and Carahsoft to learn the key principles of SASE (Secure Access Service Edge) networks and how your agency can benefit from adopting this model. The digital transformation of businesses to an app-centric world reverses network and security service design conventions. This shift has caused individuals and/or teams responsible for security and risk management to look to a converged, cloud-native SASE to protect critical s...
Splunk High-Performance Computing
Since the 1960s, supercomputers have played a critical role in countless scientific advancements. Traditionally, High-Performance Computing (HPC) was limited to exclusive groups such as university and government research. The commoditization of computer hardware experienced over the last decade has made HPC ubiquitous in its adoption. HPC is now mainstream and rapidly spreading across enterprises including academia, R1 institutions, banking, f...
Implement a Virtual Computer Lab Servic...
Join VMware, GCOM, and Carahsoft as we discuss a strategy to maximize the value and impact of your school's deployment of a virtual computer lab service. Powered by VMware's Digital Workspace technologies and Microsoft Azure Windows Virtual Desktop, this solution enables student lab "as-a-service" through the flexible delivery of applications with a traditional desktop experience, supporting functional security and course-based requirements. H...
Amplify and Integrate Your Phishing Def...
Phishing attacks are relentless, and attackers continue to find creative ways to evade perimeter technologies such as Secure Email Gateways (SEGs). As malicious emails continue to reach user inboxes, there's increased risk of account compromise, data breach, and malware attacks, including ransomware. However, by combining training and human intuition with trusted intelligence, you will be able to reduce your organization's phishing threat expo...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.