Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

iboss_logo_2015_black_300px.png
iboss Webcast

Event Date: February 07, 2024
Hosted By: iboss & Carahsoft
Carahsoft and iboss had an informational webinar on the features and benefits of implementing an E-Rate eligible Firewall-As-A-Service (FWaaS). The iboss Zero Trust Edge (ZTE) FWaaS platform can help protect students and data from cyber-attacks. It includes a wide range of advanced features, such as: ...

iboss_logo_2015_black_300px.png
iboss Webcast

Event Date: December 14, 2023
Hosted By: iboss & Carahsoft
In this session attendees learned about harnessing the cloud brings for both opportunities and vulnerabilities. ...

iboss_logo_2015_black_300px.png
iboss Webcast

Event Date: July 12, 2023
Hosted By: iboss & Carahsoft
iboss introduced you to the iboss Enterprise FWaaS – Zero Trust Edge for Education, which is USAC approved at over 90% E-Rate eligibility. In this webinar you learned about the simple steps to take to offer the iboss FWaaS platform to the K-12 customers you serve. 

iboss_logo_2015_black_300px.png
iboss Webcast

Event Date: May 12, 2022
Hosted By: iboss & Carahsoft
Attendees learned about the benefits of our award-winning partner program and how iboss enables secure connectivity for the hybrid workforce.  ...

iboss_logo_2015_black_300px.png
iboss Webcast

Event Date: May 11, 2022
Hosted By: iboss & Carahsoft
This National Webinar offered K-12 leadership key findings and strategies to prepare the nations school districts for the mounting threats facing the Education Sector.This complementary webinar featured, Doug Levin, National Director, K12SIX - a member of the ...

iboss_logo_2015_black_300px.png
iboss Webcast

Event Date: February 17, 2022
Hosted By: iboss & Carahsoft
Are you a cyber security leader looking for guidance on how to implement a move to a Zero Trust architecture in accordance to NIST guidelines? The NIST Special Publication defines Zero Trust standards that should be followed when creating a migration road map to Zero Trust?Attendees gained ...

iboss_logo_2015_black_300px.png
iboss Webcast

Event Date: October 20, 2021
Hosted By: iboss & Carahsoft
Today's schools face a plethora of challenges when it comes to cybersecurity: they are prime targets for hackers, they lack the resources available to large corporate organizations, and they must secure a widely distributed network of onsite, mobile, and remote users.School districts are now ...

iboss_logo_2015_black_300px.png
iboss Webcast

Event Date: October 19, 2021
Hosted By: iboss & Carahsoft
We had our kickoff into 2022 and discussed our Federal Channel agenda!Agenda10:00 - 10:15am: Welcome & Federal Update - Company overview, team introductions, FedRAMP status - Craig Mueller10:15 - 10:30am: Why iboss? - Business Applicability to the Government Customer, ...

iboss_logo_2015_black_300px.png
iboss Webcast

Event Date: August 25, 2021
Hosted By: iboss & Carahsoft
It's important to understand the difference between private access provided by a platform supporting Zero Trust principles and access delivered through Virtual Private Networks, or VPNs. Although both private access to private resources, the way users are granted access to those resources via iboss Private Access is ...

iboss_logo_2015_black_300px.png
iboss Webcast

Event Date: July 14, 2021
Hosted By: iboss & Carahsoft
It's important to understand the difference between private access provided by a platform supporting Zero Trust principles and access delivered through Virtual Private Networks, or VPNs. Although both private access to private resources, the way users are granted access to those resources via iboss Private Access is ...

Resources

iboss_logo_2015_black_300px.png
Blog

Concerned about the Future of your Legacy On-Prem Proxy Investment? Migrate to a SASE Platform with Confidence.

As the future of network security has shifted away from traditional perimeter-based security to the adoption of the cloud, legacy security vendors have attempted to add non-native capabilities to their portfolio to address this dramatic shift in the market.


View Resource