Count on Carahsoft® and Our Partners for the industry’s leading solutions supporting the telework, security, collaboration and distance learning requirements of today’s virtual environments.
Call Us Now: (877) 925-2624Akamai Enterprise Application Access enables you to securely provision remote access to the right applications, helping you to maintain business continuity while still enforcing appropriate security controls.
Call Us Now: (866) 421-4683BeyondTrust Secure Remote Access Solutions allow agencies to centrally manage and secure remote access for service desks and vendors. With Remote Support, you can empower the service desk to support Windows, Mac, Linux, iOS, Android, network devices, and peripherals with one, secure tool. Privileged Remote Access allows you to secure, manage, and audit vendor and employee remote privileged access without a VPN.
BeyondTrust’s Use Our Full Remote Support or Privileged Remote Access Solution with up to 5 concurrent users for 90 Days. For more information, contact the BeyondTrust team at Carahsoft at (703) 871-8548 email@example.com check out the resources below.
Call Us Now: (703) 967-2373Blackberry Desktop allows you to have secure remote access for your employees and contractors to work remotely with their own personal devices without compromising security. Users can securely access email, corporate websites, servers, content, and files on their personal windows or macOS devices.
Work from Home with Security from the Office
Empower your employees to work remotely with their own devices Broader work from home policies and requirements are becoming a reality. Make sure you’re not sacrificing productivity or security.
Secure Remote Access for Desktops and Laptops
BlackBerry offerings for desktop can turn any home laptop into a remote work laptop. There’s no need to manage devices—managing the browser is all it takes.
Call Us Now: 1 (888) 662-2724Druva is a SaaS platform for data protection and management across edge, on-premises, and cloud workloads. Druva offers a single pane of glass to protect, preserve and discover information - dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it.
FREE 6-months of data protection
New customers can protect Office 365 and data on employee’s devices free for 6 months with this promotion. This will provide an automated and secure backup and recovery solution to prevent accidental or malicious data loss, as well as ransomware attacks.
For 365, 6 months free for up to 300 employees with a 15GB source data limit per user. For endpoints, 6 months free for up to 300 employees with a 50GB source data limit per user. Effective 03/13/20 – 06/30/20. Please reach out toDruva@carahsoft.com or 1 (888) 662-2724 for details.
Call Us Now: 1 (888) 372-8468Forescout is an enterprise device visibility platform that agentlessly ensures compliance and proper network segmentation for all IPs within the network. The platform provides 100% visibility out of the box and with that information can then ensure all behavior is normal or within limits across the network. This works across VPNs, traditional IT devices, IoTs, BYODs, and OTs. With control actions, the platform can then do agentless network access control and complete device traffic management.
For more information on discounts and special contract terms, please contact the Forescout team atForescout@carahsoft.comor call 1-833-372-8468.
Call Us Now: (877) 953-5468F5’s BIG-IP Access Policy Manager (APM) delivers all of the tools that organizations need to ensure their remote users remain up and running, and above all, productive and secure. APM protects user access from all locations, over all devices. The industry’s most scalable access management solution, APM consolidates remote access, web access management, and Identity Aware Proxy (which helps drive Zero Trust Application Access), enabling organizations the flexibility to deploy secure application access (including SaaS, Cloud and on-prem) that their organization and users require.
Call Us Now: (877) 953-5468The ForgeRock Identity Platform empowers you to address today’s and tomorrow’s demands by enabling exceptional digital experiences and delivering no compromise security, privacy, and compliance for all identities — consumer, workforce, and things — and all use cases. We provide comprehensive functionality for digital identity at any scale, with simple, flexible, and rapid implementations across your agency.
For agencies that may be in need of a new modern digital identity platform as they experience new challenges, there is a free 180-dayevaluation versionof our software available for download. For more information, contact the ForgeRock team at Carahsoft at (877) 742-8468 orForegRock@carahsoft.com.Download this whitepaperto learn more about how to modernize IAM.
Call Us Now: (833) 597-5570Ivanti Cloud Remote Control provides secure remote control, from any HTML 5 browser; Ivanti Endpoint Manager gives you the ability to manage every user and any number of devices in use.
We understand that with an increase in remote workers you’ll need the ability to remotely troubleshoot an increasing number of issues. To help you, we’ll give you Ivanti Cloud Remote Control free of charge until October 31, 2020. This can be set up in hours and requires no professional services.Click here for your free trial.
Moreover, we understand you need to quickly shift from working on-network to off-network. You can easily extend your current endpoint management software with our virtual Cloud Services Appliance (CSA) which allows you to inventory, patch, deploy software, and remote troubleshoot without hardware investment.
To support these needs, we invite you to use Ivanti’s Cloud Services Appliance free of charge until October 31, 2020. This can be set up in hours and requires no professional services.Click here for your free trial,or for more information, contact the Ivanti team at Carahsoft at (703) 871-8585 firstname.lastname@example.org
Call Us Now: 1 (844) 445-5688Lookout is a cloud-based mobile threat detection software. As a company, Lookout has been focused solely on protecting iOS and Android devices for the past 15 years. Lookout protects mobile devices from risky or malicious applications, network-based attacks, jailbroken devices, and mobile phishing attacks using its robust security-cloud. Lookout has partnered with all of the major MDM services to integrate seamlessly, and make deployment as simple as possible.
Call Us Now: (703) 230-7597As government employees move to work remotely, they need secure access to the data and systems required for their job. To help with this challenge, we’re providing an unlimited edition of NetIQ Advanced Authentication that offers multi-factor authentication for as many users as you need.
As of today, existing NetIQ Advanced Authentication customers can simply replace their license key with a new COVID-19_Relief.lic that supports as many users as you need free of charge. This program allows you to protect all of your accounts with multi-factor or strong authentication.
Organizations which do not have an Advanced Authentication in place today have access to the appliance for deployment as well as the COVID-19 license that supports as many accounts as needed. The appliance is designed for quick deployment and simple configuration.
Call Us Now: (703) 945-8479NetFoundry is a cloud-native, Zero Trust, software-only secure Remote Access and Private WAN solution. Secure networks are created over the public Internet in minutes. NetFoundry is software only and leverages virtualized network infrastructure, created in cloud resources, making it far more agile, flexible, and scalable than traditional hardware-based solutions. NetFoundry's Zero Trust model secures your environment by granting users network access ONLY to the resources you allow.
NetFoundry is providing its Work From Home solution for free through the end of June in the USA to help with COVID-19 response, and free through April 15 outside the US (The regular USA rate is about $1 per user per day, depending on numbers of users and the use of other NetFoundry services).
Call Us Now: (866) 421-4683Okta Single Sign-On (SSO) and Okta Multi-Factor Authentication (MFA) enable seamless access for all your users to their most critical resources from any device or location that is all protected by strong security policies. With Okta, you can:
Okta believes that all organizations can benefit from leveraging the Okta Identity Cloud for remote work and is offering Okta core services for free to all new customers for at least six months. These include: Okta Single Sign-On (SSO) and Okta Multi-Factor Authentication (MFA) to 5 apps for all users; Best Practices Guides and Community Access; and Support and Training. Call the Okta team at Carahsoft for more details (866) 421-4683 email@example.com.For more information, check out the following resources:
Call Us Now: (855) 663-9846Palo Alto Networks Prisma Access cloud-delivered firewall platform enables customers to rapidly provision newly mobile workers, branch locations, and remote offices while maintaining their existing security posture. You get protection at scale with global coverage, so you don’t have to worry about things like sizing and deploying firewalls at your branches, or building out and managing appliances in collocation facilities.
As more agencies rapidly shift to mobile workforces, there is a growing need to securely accelerate cloud deployment as simply and effectively as possible. Palo Alto Networks has assembled a bundle to assist Federal agencies with these evolving needs, the Federal Trusted Remote User Support System (TRUSS) Bundle.
Call Us Now: (800) 340-9194Remote Work Pulse helps organizations understand how their employees are doing and what support they need as they adapt to new work environments. As we all navigate this new terrain, ensuring our employees’ concerns are heard and addressed is paramount in order to maintain business continuity and close experience gaps.
Call Us Now: (866)-421-4683Federate ID for Better Collaboration Beyond the Perimeter: In this time of crisis, companies suddenly have entire labor forces working remotely — and they’re scrambling to ensure secure large-scale collaboration outside the network. With so many employees working digitally, identity is now the new perimeter and a unified source of ID attributes is critical for securing your team’s efforts. Quickly gain a 360-degree view of your identity — regardless of source or protocol—that’s available beyond the network. RadiantOne FID transforms heterogeneous identity into the precise profiles required by applications and syncs ID everywhere it’s needed.
For an objective view of the (new) future of identity management, download theTechVision Research Enterprise IAM Strategic Action Plan.To learn more about benefits of deploying Radiant Logic to support your remote access requirements, contact the Radiant Logic team at Carahsoft at (866)-421-4683 orRadiantLogic@carahsoft.comor visitRadiant Logic.
Call Us Now: (800) 340-9194RSA SecurID Access provides a solution for maintaining a consistent multi-factor authentication policy during a business emergency, when large numbers of users may be required to work remotely for a period of time, enhancing the security of your organization by ensuring that your business user identities are assured and access to critical applications and data remain intact.
Call Us Now: (877) 733-2007With the Salesforce mobile app, you can securely collaborate with your team on the go. Create tailored mobile experiences quickly and easily with clicks, not code. Access all your relevant data from your device with seamless transitions from desktop to mobile.
Call Us Now: (866) 421-4683Dameware® Remote Support is an affordable and easy-to-use remote support software designed to simplify and accelerate remote IT administration tasks for IT admins and support technicians.
Call Us Now: (855) 377-5865Splunk's Remote Work Insights delivers real-time visibility across multiple disparate systems, such as VPN, authentication and collaboration tools with executive level views and collaboration that boost employee productivity and ensure high performance for your critical business activities. The solution empowers IT and Security teams to manage applications, monitor business performance and secure networks from remote locations.
Call Us Now: (888) 662-2724We are suddenly facing new cyber risks created by a surge in remote employees who may use personal assets for business or be more susceptible to phishing during times of crisis. To reduce the risk of this new attack vector, we all need to extend our security measures and include remote workers and devices as part of our enterprise vulnerability management programs.
Existing Customers: Extend Your Tenable.io Licenses for Free
To support you through these changing and uncertain times,try Tenable.io free for 30 days.
Tenable.sc and Nessus Professional Customers: Free Tenable.io License with Unlimited Agent Scanning
For Tenable.sc and Nessus Professional customers, we are offering a free Tenable.io license with unlimited agent scanning for 30 days.
To learn more about these solutions and the special promotions, contact us at (888) 662-2724 orTenable@carahsoft.com, orview this on-demand webcast: Understand and Address the Cybersecurity Impacts of COVID-19.
Call Us Now: (866) 307-7233Thales Trusted Cyber Technologies (TCT) offers solutions that facilitate enterprise-wide security initiatives for secure remote access to enterprise resources. Our solutions enable employees to securely access agency resources while ensuring that data remains fully protected:
Call Us Now: (703)-230-7597Trend Micro, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Their innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints.
Call Us Now: (866) 421-4683Zscaler Private Access (ZPA), a zero trust FedRAMP authorized network access service, delivers the same functionality as VPN but doesn’t require the traffic to flow through on-premise hardware. A fully cloud-delivered service, ZPA ensures that only authorized users have access to specific private applications, enabling access to agency assets remotely, securely and at scale.
Zscaler is running a global promotion of its cloud VPN technology. For more information on discounts, special contract terms and complimentary deployment services, please contact the Zscaler team at (703) 871-8548 firstname.lastname@example.org.