Back to Search Begin New Search Save Search Auto-Notify
Demystifying The Technology Modernizati...
The Technology Modernization Fund (TMF) was enacted as part of the Modernizing Government Technology Act of 2017, with a goal of better securing sensitive Federal systems and data while utilizing taxpayer dollars as efficiently as possible. Earlier this year, the American Rescue Plan Act added $1 Billion dollars to the program. These funds can help agencies (Civilian, DoD, and the Intelligence Community) modernize systems, expand cybersecurity...
Add Favorite
Protecting Public Sector Agencies Again...
The global pandemic has materially increased citizen engagement with government applications across federal, state, local, and education levels. In turn, it has also accelerated cyberattacks and opened up new opportunities for attackers to enrich themselves. Join F5 and Carahsoft for a webinar addressing the why and how of defending public sector agencies against credential stuffing attacks. During this webinar, we will cover: The impact of cr...
Add Favorite
ExtraHop Demo Desk
Agencies today are working across different platforms and environments, creating a complex web of workloads consisting of hardware, applications, and data spread. Whether it's on edge, core, remote workforce, or cloud deployments, visibility is essentially to ensure security within the organization. Now, as a hybrid, multi-cloud, and containerized environments are standing up, unifying security controls across different environments is critica...
Add Favorite
Zero Trust Architecture - What You Shou...
While the concept of Zero Trust has been around for some time, the publication of NIST SP 800-207 (Zero Trust Architecture) has provided clarity, definition, and a recommended approach to a Zero Trust Architecture. President Biden's May 12th Executive Order has created a policy for Federal Agencies to adopt a Zero Trust Architecture, which will likely impact State and Local Government agencies, service providers, supply chains, and private ent...
Add Favorite
Best Practices for Data in Transit Encryption
High speed networks are the critical foundation that supports many of an agency's most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. Threats such as shared infrastructure exposure, man-in-the-middle att...
Add Favorite
Detect Cellular, Bluetooth, BLE, Wi-Fi...
Carahsoft and Bastille invite you to join us as we learn how to use a device detection and location kit to find unauthorized devices. The Concern:Are wireless and cellular devices coming into, and possibly passing through, the Visiting Room into other areas a concern for your facility? Bastille's Solution: Bastille detects and locates Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. This provides security teams the ability to accurately locat...
Add Favorite
Solving STIGs and Automating Compliance...
System Technical Implementation Guidelines (STIGs) are system configuration guidelines provided by the Defense Information Systems Agency (DISA) that are commonly used in the federal and DoD space to meet system compliance requirements when it comes to system configuration. This effort can be extraordinarily complex and time-consuming for the people that are responsible for executing this work. Not only must each system component be configured...
Add Favorite
On-Prem Migration to Cloud: The USDA Journey
There are numerous benefits when moving SAP systems to the cloud, but the migration process is a massive undertaking involving your business-critical applications and frequently means giving up control and visibility into infrastructure security, operations, and maintenance. Choosing the right business partner is crucial to ensure the applications at the core of your business are stable, secure, and compliant throughout this process. Join our...
Add Favorite
Surveillance Off-Grid: Deploying Hybrid...
New surveillance technology and smart analytics allow technology to supplement and sometimes even replace physical security guards. Deploying this technology has the potential to make a facility much more secure, but security experts have a tendency to neglect the most vulnerable areas because of local power or connectivity issues. In a world where the power grid is increasingly unreliable, we'll explore new technology solutions that allow for...
Add Favorite
AWS Los Angeles Innovation Day
Join AWS and Carahsoft virtually in Los Angeles! This online event will focus on the practical aspects of migration, workloads, databases, storage, and disaster recovery. Learn how the sophisticated, yet simple, AWS approach can help your organization thrive. Take a look at our event page to stay up-to-date on the latest announcements and resources! This virtual event will feature the following sessions: Time Session 9:15am - 9:30am Welcome an...
Add Favorite
Back to Search Begin New Search