Event Date: October 17, 2017 at 11:00 AM ET Hosted By: F5 Networks & Carahsoft Location: Washington, DC
Join F5 Networks and Carahsoft for Session 3 of the Exploring F5 Seminar Series: Cloud Architectures Defined.In Session 1 of the Exploring F5 Seminar Series, we defined the framework for a variety of topics related to F5’s vision for cloud services and the new network ...
Event Date: October 24, 2017 at 12:00 PM ET Hosted By: Okta, Skyhigh Networks & GuidePoint Security Location: Philadelphia, PA
The adoption of cloud and mobile technologies has changed the threat landscape for IT and security professionals. While agility and scalability will benefit your organization, you will be faced with the challenge of managing identities and maintaining compliance as your data moves to the cloud. Are you ...
Event Date: October 24, 2017 at 2:00 PM ET Hosted By: Lookout & Carahsoft
Join Lookout and Carahsoft for a live webcast to learned the latest insights into mobile threats affecting the government, including how to protect yourself from:Network-based risksApplication-based risksDevice-based risksLookout will demonstrate their Mobile Endpoint Security, ...
Event Date: October 25, 2017 at 3:00 PM ET Hosted By: F5 Networks, ClearShark & Carahsoft Location: Norfolk, VA
Join F5 Networks, Splunk, and ClearShark for a complimentary TechTalk on the integration capability between F5’s BIG-IP appliances and Splunk’s Big Data analytics software via the “F5 Networks – Analytics App” on Splunk. The “F5 Networks – Analytics ...
Event Date: October 26, 2017 at 10:45 AM ET Hosted By: Okta, Zscaler, Alchemy Tech Group & Carahsoft Location: Baton Rouge, LA
The rapid adoption of cloud applications is modernizing the world of IT. These on-demand services provide tremendous ROI, but also introduce new identity challenges that must be overcome to tap into their potential.Join us on October 26th for a Cloud ...
Event Date: October 26, 2017 at 2:00 PM ET Hosted By: Carahsoft & ID.me
The Equifax breach exposed names, dates of birth, and social security numbers of 140 million Americans, compromising all services that relied on that information to protect high-value services online. Government services are particularly vulnerable — according to the Federal Trade Commission, 49% ...
Event Date: November 02, 2017 at 11:00 AM ET Hosted By: InQuisient & Carahsoft Location: McLean, VA
Please join InQuisient for lunch on November 2nd, meet our CEO, Scott Dixon Smith, and learn how the InQuisient software platform can help you bring order to your current enterprise data management challenges. InQuisient’s suite of tools helps government enterprises manage billions of dollars ...
Event Date: October 11, 2017 Hosted By: FireEye & Carahsoft
Cyber attackers continue to evolve, improving their tactics, techniques, and procedures faster than security teams can keep up. Increasingly organized and collaborative, their methods grow more sophisticated each year - and 2016 was no exception. Download this archived ...
Event Date: October 05, 2017 Hosted By: VMware & Carahsoft Location: Sacramento, CA
Thanks for your interest in the VMware Sacramento Day!Attendees of this event learned about the following:Insights into VMware best practices, planning, and strategiesEnablement and training on VMware's emerging technologiesSoftware defined enterprise principles ...
Event Date: October 05, 2017 Hosted By: SAP NS2 & Carahsoft
This webcast featured Mr. Alan Wade, former CIO of the Central Intelligence Agency, Raj Dodhiawala, Chief Product Officer of CounterTack, and Bob Palmer, Vice President of Solutions and Innovation at SAP National Security ...
Event Date: September 21, 2017 Hosted By: VMware & Carahsoft
During this webcast, speaker Carlos Phoenix, Global Cyber Strategist at VMware, discussed:Data protecting challenges faced by universities Compliance requirements being requested by the community, and how VMware can respond to these challenges
Event Date: September 21, 2017 Hosted By: Lookout & Carahsoft
Attendees of this webcast learned the latest insights into mobile threats affecting the government, including how to protect yourself from:Network-based risksApplication-based risksDevice-based risksLookout demonstrated their Mobile Endpoint Security, ...
Event Date: September 21, 2017 Hosted By: Carahsoft
Come get a high level overview of what you can do with Splunk, including a chance to see the tool in action in situations ranging from IT operations, to security, to the Internet of Things (IoT), and beyond.
Event Date: September 21, 2017 Hosted By: Okta, Box, AE Business Solutions & Carahsoft Location: Madison, WI
The rapid adoption of cloud applications is modernizing the world of IT. These on-demand services provide tremendous ROI, but also introduce new identity challenges that must be overcome to tap into their potential.Attendees joined us on September 21st for ...
Event Date: September 20, 2017 Hosted By: Zscaler & Carahsoft
Office 365 is all the rage in California county governments - Is your network ready and secure? Most California county governments are planning for Office 365 or have already made the transition. Running Office 365 in a traditional hub-and-spoke network environment can quickly lead to delayed ...
Event Date: September 20, 2017 Hosted By: Palo Alto Networks & Carahsoft Location: Salinas, CA
In this workshop, attendees learned how to:Establish policies to prevent known threatsEnable sandbox threat analysis using WildFire to control unknown malwareConfigure decryption and URL filtering policies to manage high-risk applicationsEnable policies to prevent unknown ...
Event Date: September 19, 2017 Hosted By: ServiceNow & Carahsoft
Thank you for your interest in our ServiceNow webinar, Increase Agility, Security, and Stability from Development to IT Operations, on September 19, 2017. We hope this information is valuable to you and your organization.Attendees of this webinar heard Chris Anello, Sr. Solution Consultant, ...
NetAbstraction provides secure, varied, and non-apparent network connectivity, a range of identity
management and persona attribution options to alter or reduce the cyber attack profile; support for
migration on customer activities to the cloud; and system designs to help control customer
F5 and Amazon Web Services (AWS) have partnered to help you rapidly deploy application workloads without incurring the capital expenditures of new infrastructure. AWS is both a pioneer and leader in the public cloud marketplace, providing customers with the ability to provision and deploy applicatio...
ThreatStream provides the essential analysis and correlation that you need to translate raw, unstructured and duplicative data into true intelligence. Reduce the noise of false positives from outdated irrelevant data in minutes. What’s left is true insight in the form of pre-built rules, reports, ...
I didn't know it at the time but my introduction to the security specialty of incident response occurred when I first read the book The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, by Clifford Stoll. The book goes into great detail of how Stoll combined his general curio...
The Center for Protection of the National Infrastructure (CPNI) and CERT-UK recently sponsored a white paper called Threat Intelligence: Collecting, Analyzing, Evaluating. The paper discusses the need for ensuring that intelligence collected be relevant for major security stakeholders in your organi...
IT security teams within federal government agencies and their contractors face a daunting series of challenges in securing their networks against modern malware intrusions, including advanced persistent threats (APTs), advanced targeted attacks (ATAs), polymorphic malware, and file-less intrusions....
Perimeter defenses are inadequate protection against today's advanced threats. Traditional signature-based approaches leave a gap as attackers continuously use new, hard-to-detect methods to compromise hosts, establish a hidden presence on target systems, and exfiltrate sensitive data out of organiz...
From the data center to the point of care, VMware
accelerates digital transformation so healthcare organizations can dedicate
fewer resources to maintaining legacy apps and more to continuously improving
patient care. At the heart of the transformation is the Software-Defined Data
VMware NSX enables the segmentation of a network down to the individual VM level, a concept known as micro-segmentation. By applying security policies to individual VMs, NSX reduces east-west traffic within the data center and prevents attackers from moving laterally in search of information.