Back to Search Begin New Search Save Search Auto-Notify
F5 Federal Pacific TechTalk
Your applications and data face new threats from attacks that pose increasing risks to your networks and applications. F5 provides a flexible, ICSA-certified web application firewall and comprehensive, policy-based web app security to address emerging threats at the application level. The F5 solution lowers maintenance and management costs and increases the confidentiality, availability, and integrity of your applications, network, and process...
February 12, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: San Diego, CA
Add Favorite
The Most Effective Security Meets the M...
The leading Websense® real-time security defenses against advanced threats and data theft now integrate with the F5® BIG-IP® platform, securely connecting users to fast and highly available applications. Protect your enterprise application data from loss or theft, while protecting users accessing the web from main offices, remote, or mobile locations. Optimize and load balance web traffic, increase SSL performance, and layer identi...
February 12, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
DoD Collaboration Conference: Collabora...
Join the DoD Collaboration Conference: Collaboration in the Joint Information Environment on 12 February! The conference is bringing together senior-level military, civilian, and research-based subject matter experts to share insights about the trends, principles, strategic plans, and technologies transforming how knowledge is shared digitally among warfighters and support personnel across domains. Technology is vastly changing the way the DoD...
February 12, 2014
Organizer: Adobe Government at Carahsoft
Location: Webcast
Add Favorite
Continuous Monitoring for the Cloud
Continuous Monitoring for the Cloud As outlined by NIST, the objective of a continuous monitoring program is to determine if the complete set of planned, required, and deployed security controls within an information system, or inherited by the system, continue to be effective over time in light of the inevitable changes that occur. Monitoring this change is challenging even in traditional datacenter environments with dedicated physical server...
February 11, 2014
Organizer: HyTrust Government Team at Carahsoft
Location: Virtual
Add Favorite
Protecting Your Identity, Location, and...
Enterprise level cyber-attacks continue to increase dramatically. Anyone directly using the Internet exposes their IP address and network identity to potentially unwanted scrutiny and/or attack. Because typical government systems are fixed, static, and easily located, they more vulnerable to attack. NetAbstraction is a cloud-based service that protects customer identities, varies access routing, and provides enhanced security capabilities to s...
February 11, 2014
Organizer: NetAbstraction Government at Carahsoft Technology
Location: Webcast
Add Favorite
Intro to Typesafe Reactive Platform: Ge...
Interested in building reactive, modern software on the JVM? Curious how to get up and running with Play Framework, Akka, and Scala? Tune in on February 11th for an introduction to the Typesafe Reactive Platform and get started in no time! Typesafe is dedicated to helping developers build reactive applications. With the Typesafe Reactive Platform, including Play Framework, Akka, and Scala, you can deliver highly responsive user experiences bac...
February 11, 2014
Organizer: Typesafe Government at Carahsoft
Location: Webcast
Add Favorite
F5 Integration with Splunk
Splunk arms the entire organization with an up-to-the-moment understanding of the IT infrastructure, without compromising access to mission-critical systems or confidential data. Splunk is easy to use, downloads in minutes, delivers value in hours, and it's free. F5 and Splunk have partnered to deliver advanced reporting for F5 appliances and software modules. While all of these F5 solutions come packaged with detailed reporting capabilities a...
February 11, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Annapolis Junction, MD
Add Favorite
Symantec Presents: DHS CDM Program Review
By now you’ve probably heard about DHS’s Continuous Diagnostics & Mitigation (CDM) Program, and the corresponding Continuous Monitoring as a Service (CMaaS) GSA BPA. But did you know: DHS has $185 million to buy Continuous Monitoring tools for Civilian agencies? DHS will receive an additional $190 million (approx.) in the recent budget deal? Installation and integration services are also available? DHS is gathering requirements...
February 11, 2014
Organizer: Symantec Government Team at Carahsoft Technology Corp
Location: Webcast
Add Favorite
Unified Platform for Force Protection:...
Situational awareness relies heavily on monitoring social media, turning data into actionable intelligence, analyzing various data feeds, and creating executive level reports in a time sensitive manner. iMapData’s Unified Platform is designed to visualize and identify mission critical data to help perform geospatial and temporal analysis, and gain expanded situational awareness of emerging threats and opportunities. From the dashboard, u...
February 5, 2014
Organizer: iMapData Government Team at Carahsoft
Location: Virtual
Add Favorite
F5 Security TechTalk
F5 Security TechTalkMitigating DDoS Attacks in Government, Healthcare, and EducationAs the magnitude of the distributed denial-of-service (DDoS) threat spectrum continues to evolve, government, healthcare, and higher education IT departments continue to search for the best way to protect applications and data from increasingly sophisticated, well-coordinated attacks. The solution is a strategy that focuses on blocking such attacks, while also...
January 30, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Baltimore, MD
Add Favorite
Back to Search Begin New Search