Event Date: August 23, 2017 at 2:00 PM EDT Hosted By: Dtex Systems & Carahsoft
Join Dtex and Carahsoft for a complimentary webcast on August 23rd to learn more about the key benefits of the Dtex User Behavior Intelligence Platform, including how it can help you:Fill the gap of endpoint visibility in your environmentDetect unusual data aggregation, privilege ...
Event Date: August 30, 2017 at 11:30 AM EDT Hosted By: F5 Networks, ClearShark & Carahsoft Location: San Diego, CA
Join F5 Networks, Splunk, and ClearShark for a complimentary TechTalk on the integration capability between F5’s BIG-IP appliances and Splunk’s Big Data analytics software via the “F5 Networks – Analytics App” on Splunk. The “F5 Networks – ...
Event Date: August 30, 2017 at 2:00 PM EDT Hosted By: Infoblox & Carahsoft
If your government organization is like many, you’ve made the move or are in the process of moving to digital, adopting cloud and mobile services. While that move offers many benefits in terms of efficiency and communication, it also creates more complexity and increases your vulnerability to cyber attacks, ...
Event Date: September 07, 2017 at 2:00 PM EDT Hosted By: Akamai & Carahsoft
On May 11th, 2017, President Donald Trump enacted the Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, announcing several new policies and actions to meet the title objective. So, what should agency heads ...
Event Date: September 07, 2017 at 2:00 PM EDT Hosted By: Fornetix & Carahsoft
Join Fornetix and Carahsoft for a complimentary webcast where you will learn how Fornetix Key Orchestration can:Manage your entire network’s encryption under one roofLower the risk of crippling data breachesHelp you stay ahead of ever-increasing data regulationsOpen new possibilities for ...
Event Date: September 11, 2017 Hosted By: HPE & Carahsoft
Join us at the security conference of the year. Gain the insight you need to innovate fearlessly in the face of relentless risks. Protect what matters most to you by building security into your data and applications. Develop your career as a security expert and enable your agency to deliver security ...
Event Date: September 20, 2017 at 2:00 PM EDT Hosted By: Zscaler & Carahsoft
Office 365 is all the rage in California county governments - Is your network ready and secure? Most California county governments are planning for Office 365 or have already made the transition. Running Office 365 in a traditional hub-and-spoke network environment can quickly lead to delayed ...
Event Date: August 22, 2017 Hosted By: VMware & Carahsoft
During this webcast John Jordan, Army ELA Program Manager at VMware, the CIO/G-6, and the Carahsoft Army Team discussed:VMware virtualization solutions available to the Army via the ELAHow to obtain VMware education vouchers for Army end-usersThe Level of ...
Attendees of this webcast learned about this secure and compliance capable HCI solution from HyTrust, Intel, and VMware, as well as how:Eight years of joint R&D between HyTrust, Intel, and VMware, including joint R&D in partnership with NIST at the US National ...
The auditability of the DOD is dependent on identifying, locating, and providing the required Key Supporting Documents (KSD) in a timely manner to auditors. However, it's often unclear which KSDs are relevant to the request, where they are located and in what format, or whether or not KSDs were even captured ...
Event Date: August 09, 2017 Hosted By: Symantec & Carahsoft Location: Washington, DC
Thanks for your interest in our Symantec seminar, Cyber on the Hill.Attendees of this event learned more about ransomware statistics of 2016, the anatomy and tools of a ransomware attack, and the steps users and organizations can take to protect themselves.
Event Date: August 08, 2017 Hosted By: F5 Networks & Carahsoft Location: Reston, VA
Attendees of this TechTalk heard F5 Networks and GuidePoint Security discuss the benefits of deploying Office 365 in the cloud, including:Secure anytime, anywhere access to Office 365 through integrated, standards-based identity federation, single sign-on (SSO), and adaptive ...
Event Date: August 01, 2017 Hosted By: Exabeam & Carahsoft
While many consider an insider threat to be an employee purposely stealing sensitive information, there are many more flavors of this type of attack. Hackers using valid stolen credentials can, and do, cause at least as much impact as a malicious employee. Credential-based threats are the most common factor in data ...
NetAbstraction provides secure, varied, and non-apparent network connectivity, a range of identity
management and persona attribution options to alter or reduce the cyber attack profile; support for
migration on customer activities to the cloud; and system designs to help control customer
F5 and Amazon Web Services (AWS) have partnered to help you rapidly deploy application workloads without incurring the capital expenditures of new infrastructure. AWS is both a pioneer and leader in the public cloud marketplace, providing customers with the ability to provision and deploy applicatio...
ThreatStream provides the essential analysis and correlation that you need to translate raw, unstructured and duplicative data into true intelligence. Reduce the noise of false positives from outdated irrelevant data in minutes. What’s left is true insight in the form of pre-built rules, reports, ...
I didn't know it at the time but my introduction to the security specialty of incident response occurred when I first read the book The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, by Clifford Stoll. The book goes into great detail of how Stoll combined his general curio...
The Center for Protection of the National Infrastructure (CPNI) and CERT-UK recently sponsored a white paper called Threat Intelligence: Collecting, Analyzing, Evaluating. The paper discusses the need for ensuring that intelligence collected be relevant for major security stakeholders in your organi...
IT security teams within federal government agencies and their contractors face a daunting series of challenges in securing their networks against modern malware intrusions, including advanced persistent threats (APTs), advanced targeted attacks (ATAs), polymorphic malware, and file-less intrusions....
Perimeter defenses are inadequate protection against today's advanced threats. Traditional signature-based approaches leave a gap as attackers continuously use new, hard-to-detect methods to compromise hosts, establish a hidden presence on target systems, and exfiltrate sensitive data out of organiz...
Today’s evolving threat landscape makes it difficult for government agencies to
adequately detect and respond to increasingly sophisticated attacks. Perhaps the single
most challenging threat facing the United States government is the insider threat. Though
they occur with less frequency than t...
The Certes Enforcement Point (CEP) Variable Speed Encryptors (VSEs) are bandwidth customizable multi-layer encryption appliances that provide tunnel-less data protection, including Ethernet frame encryption for Layer 2 networks, IP packet encryption for Layer 3 networks, and Layer 4 data payload enc...