Back to Search Begin New Search Save Search Auto-Notify
Going Beyond Zero Trust Requirements
Zero Trust Architectures have become a focal point for the US Government in their efforts to improve the nation’s cybersecurity posture. Traditionally providing secure access to applications, including those hosted in the cloud, has forced agencies to make arduous compromises. They’ve needed to either sacrifice security for performance when bypassing security inspection, or performance for security by routing traffic through massiv...
Add Favorite
Dell Technologies Webinar Series
Join Dell Technologies and Carahsoft to learn about: Zero Trust & Data Protection Suite Edge & AI Hybrid Cloud & HCI Dell's Portfolio & Success
Add Favorite
Department of Energy - Okta: Identity P...
Almost every organization has experienced a serious security breach or has felt the effects of a breach on another organization. To prevent breaches, Department of Energy labs often employ a variety of point solutions, but these aren’t comprehensive or simple to manage solutions. An identity based security strategy is the key to developing a Zero Trust Architecture (ZTA) that can help address DOE lab's security challenges. Join Okta in t...
Add Favorite
Learn about Microsoft Sentinel DoD Zero...
According to the Microsoft Digital Defense Report of 2022, the United States government network is the target of nearly half of global nation-state attacks? The US Department of Defense released its initial Zero Trust reference architecture in 2022.The latest update provides crucial details for implementing the Zero Trust strategy, including clear guidance of 45 separate capabilities and 152 activities needed to adopt a consistent approach. Jo...
Add Favorite
BeyondTrust Tech Talk: Gain a 360-Degre...
With the increase in sophisticated cyberattacks, it is imperative to revamp cybersecurity processes and re-focus security beyond the perimeter. In their Special Publication, 800-207 Zero Trust Architecture, NIST points to identity as the critical first step to regaining control over the perimeter. Join this interactive session and demo to understand how BeyondTrust Privileged Account and Session Management (PASM) can help you control access an...
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
Ensuring Uptime with Deep Observability
Carahsoft is inviting you to a webinar to discover how LiveAction and Gigamon's joint solution addresses the unique challenges faced by federal agencies in managing, securing, and optimizing their network infrastructures. In this webinar, you’ll learn some of the key benefits of leveraging Gigamon’s Deep Observability Pipeline with LiveAction’s Network Performance Monitoring Solutions, such as: Comprehensive Network Visibilit...
Add Favorite
Revolutionize Your Agency's Security Ma...
HashiCorp and industry experts came together on November 21st for a zero trust, identity-based hands-on workshop to discover how HashiCorp Vault enables enterprises to centrally store, access and distribute dynamic secrets like tokens, passwords, certificates and encryption keys across and public or private cloud environment. This hands-on on-demand workshop was the gateway to understanding how HashiCorp Vault simplifies the data journey of go...
Add Favorite
DoDIIS Worldwide Webinar Series: Securi...
Yubico and Carahsoft hosted this webinar leading up to DoDIIS 2023 and explored how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Zero Trust is vital to maintain robust data security and easy information sharing across the Department of Defense (DoD) and intelligence communities. Previously, DOD professionals relied upon issuance of credentials stored on single-protocol smar...
Add Favorite
Learn about Microsoft Sentinel DoD Zero...
According to the Microsoft Digital Defense Report of 2022, the United States government network is the target of nearly half of global nation-state attacks? The US Department of Defense released its initial Zero Trust reference architecture in 2022.The latest update provides crucial details for implementing the Zero Trust strategy, including clear guidance of 45 separate capabilities and 152 activities needed to adopt a consistent approach. Jo...
Add Favorite
Back to Search Begin New Search