Back to Search Begin New Search Save Search Auto-Notify
How Technologically Healthy Are You?
More government employees are teleworking, which can create riskier IT behavior. Cybersecurity attacks are increasing, and the federal government must be vigilant in safeguarding against threats and ensuring a healthy IT infrastructure, particularly during this digitally transformative time. These attacks deprive mission-critical government agencies from their devices, data or internet and can lead to serious consequences, failing entire citie...
Add Favorite
Enable a Remote Workforce and Reduce Co...
Join VMware, GCOM, and Carahsoft as we discuss a strategy to enable a remote workforce, maximizing productivity while minimizing costs. The deployment of a remote worker service, powered by VMware's Digital Workspace technologies and Microsoft Azure Windows Virtual Desktop enables employee access "as-a-service" through the flexible delivery of applications with a traditional desktop experience, supporting functional security and other operati...
Add Favorite
Preventing Theft of Government Benefits...
Join F5 Networks and Carahsoft for a webinar addressing the impacts of not being able to detect when your adversary is using automated attack techniques to gain unauthorized access, and remove sensitive data and assets from your enterprise. The current global pandemic has materially accelerated citizen engagement with government applications across federal, state, and local levels, as well as greatly increased the financial resources being tra...
Add Favorite
Beyond Traditional Anti-Virus: Protecti...
NS2 delivers innovative technologies from SAP and our affiliates to help our government clients execute their missions, securely. Cyber defense solutions from NS2, powered by GoSecure, are available to Government departments and agencies through the Continuous Diagnostic and Mitigation Program (CDM Program) on the Approved Products List. Help your agency detect and respond to cyber-attacks before they can damage your infrastructure or steal y...
Add Favorite
Transform Windows 10 with VMware Modern...
Windows 10 opens the door for you to transform siloed desktops, mobile device and application management, and adopt a unified approach across your organization with its new cloud-based management framework known as Modern Management. Modern Management represents a shift in the Windows management process to support the delivery of policies, updates, patches, and applications from the cloud. Windows 10 enables cloud-based delivery of security po...
Add Favorite
Remote Work with NVIDIA: GPU Accelerate...
As the public sector is called upon to address society's most pressing challenges, teleworking has become a crucial way for employees and contractors to maintain continuity and responsiveness. With NVIDIA Quadro RTX-powered laptops, virtual workstations, and cloud computing, you can tackle critical day-to-day tasks and compute-heavy workloads--from home or wherever you need to work. By attending this live CPE webinar, you'll learn: How the pow...
Add Favorite
Ensuring a Secure Infrastructure for Em...
As IT needs have significantly increased, so has the requirement of a secure infrastructure to support the sudden world of remote living for government agencies and the communities they serve. States, cities and counties have transitioned most employees to remote work, and are now taking a closer look at preventing cyberattacks as workers log in from their homes and personal devices. Not to mention, the increased traffic to citizen portals als...
Add Favorite
Improving Remote Employee Support
COVID-19 concerns are changing how agencies run their business and IT operations, dramatically expanding demand for teleworking and application access to collaborative systems. This demand is creating significant challenges for IT operations and has increased the need for IT pros to keep applications, services, and infrastructures up and running—and safe. This instructional webinar will focus on Performance monitoring solutions that prov...
Add Favorite
Splunk: Driving Patient Privacy
Patient privacy is an ever-growing concern within our medical community. Join Splunk, True Zero Technologies, and Carahsoft to learn how Splunk uses data from all data sources to identify breach or leak incidents concerning ePHI.During this webinar, we will discuss how:Proactive measures and real time response to security breaches or unauthorized access attempts help ensure privacy of patient informationImplementing these protective measures h...
Add Favorite
How to Implement an Effective Zero Trus...
The rapid adoption of IoT devices, cloud infrastructures, the recent expansion of remote workforces, and the increased execution of service contracts with multi-tier contractors have created massive distributed IT networks placing more emphasis on Zero Trust approaches. These distributed environments display increased attack surface areas, creating multiple entry points for adversarial actors to penetrate and potentially own a technology ecosy...
Add Favorite
Back to Search Begin New Search