Carahsoft » Innovation in Government
explore close
  • Home
  • Solutions
    BACK TO MAIN MENU
    • All
    • Artificial Intelligence
    • Big Data
    • Customer Experience
    • Cloud
    • CMMC
    • Cybersecurity
    • DevSecOps
    • Edge Computing
    • Healthcare
    • IT Modernization
    • Law Enforcement
    • Mobility & Telework
    • Open Source
    • Software Development
    • Supply Chain
    • 5G
  • Vendors
    BACK TO MAIN MENU
    • All
    • Accenture
    • AccessData
    • Acquia
    • Acumen Solutions
    • Adobe
    • Adobe Connect
    • Akamai
    • Alfresco
    • Alteryx
    • Anchore
    • Anitian
    • Atlassian
    • AWS
    • Axon
    • BeyondTrust
    • BlackBerry
    • Black Cape
    • BluVector
    • Boomi
    • Broadcom
    • CalypsoAI
    • Centrify
    • Chainalysis
    • Clarifai
    • CloudBees
    • Cloudera
    • Collibra
    • Concur
    • Confluent
    • Corelight
    • CVEDIA
    • CyberArk
    • DataRobot
    • Dell Technologies
    • Deloitte
    • DocuSign
    • Eightfold
    • Exabeam
    • Expanse
    • F5
    • Fidelis Cybersecurity
    • FireEye
    • Forcepoint
    • Forescout
    • Fortinet
    • Forward Networks
    • Gemini Data
    • Genesys
    • Gigamon
    • GitLab
    • Google Cloud
    • Granicus (formerly GovDelivery)
    • Hootsuite
    • HyTrust
    • H20.ai
    • Infoblox
    • Informatica
    • IPsoft
    • Liferay
    • LinkedIn
    • Lockheed Martin
    • Lookout
    • McAfee
    • Micro Focus Government Solutions
    • Microsoft
    • milCloud 2.0
    • MongoDB
    • MuleSoft
    • NowSecure
    • Nuance
    • Nutanix
    • NVIDIA
    • Okta
    • OPSWAT
    • Palo Alto Networks
    • Pentaho
    • Pivotal
    • Project Hosts
    • Publicis.Sapient
    • Qmulos
    • Qualtrics
    • Qualys
    • Rackspace Technology
    • Radiant Logic
    • Recorded Future
    • Red Hat
    • RSA
    • Rubrik
    • SailPoint
    • Salesforce
    • SAP
    • SAP NS2
    • Secureworks
    • SentinelOne
    • ServiceNow
    • Slack
    • Smartsheet
    • Snowflake
    • SolarWinds
    • Sonatype
    • Splunk
    • Symantec
    • Tableau
    • Talkdesk
    • Tenable
    • Thales TCT
    • ThoughtSpot
    • Trend Micro
    • Trifacta
    • Trustwave
    • UiPath
    • Veritas
    • Virtustream
    • VMware
    • Wasabi
    • Zscaler
    • Zoom
7x24@carahsoft.com 888-662-2724
explore close
  • Big Data
  • Confluent

Interview: How Agencies Can Make Data an Active Asset to Drive Better Outcomes

Jason Schick, General Manager for U.S. Public Sector at Confluent, discusses how agencies need to accelerate the value of their data to drive real-time decisions.

Listen Now »
  • Cloud
  • All

Expert Edition: Get Ready for Multi-Cloud

Learn just how potential outcomes drive cloud strategies in a post-pandemic world. Featuring insights from multi-cloud leaders at Databricks, Splunk, Google, Veritas and Red Hat.

Read More »
  • IT Modernization
  • All

Report: Powering Transformation Solutions

SIs recognize the key role they can play as a conduit for innovations developed by companies outside the government market, and they are evolving to meet the government’s need for digital transformation and building partnerships with emerging technology companies.

Read More »
  • IT Modernization
  • All

Guide: Turning Vision into Reality: How Agencies Can Forever Improve

The purpose of this guide is not to help organizations prepare for the next disaster. The purpose is to go beyond that — to explore how agencies can take a broader, more overarching and continuous approach to self-improvement. Featuring insights from leaders at USAID, OPM, iNet and Michigan's Wayne County as well as Carahsoft's technology experts.

Read More »
  • All
  • All

2021 Year in Review: FCW Compendium

To help guide government leaders through the continuing uncertainties around COVID-19, funding, and technological developments, Carahsoft has partnered with FCW to explore the latest IT trends and strategies

Read More »
  • Customer Experience
  • All

Report: Best of What's New in Government Customer Experience

Learn how your agency or municipality can adapt to this new environment, including taking advantage of COVID relief funds, modernizing IT infrastructure and expanding broadband.

Read More »

  • FCW_Oct.Nov_Web_Graphics_Dell.jpg

    The Evolution in AI Technology

    Increasingly sophisticated hardware and software make it easy to tailor AI systems to agencies’ needs.


    • Artificial Intelligence, Dell Technologies
  • FCW_Oct.Nov_Executive_Viewpoint_Thumbnail.jpg

    Executive Viewpoint A Conversation with Ben Goldman

    A technology leader discusses how an industry partnership is accelerating the Navy’s use of AI.


    • Artificial Intelligence, All
  • FNN_Cyber_Leaders_Thumbnail.jpg

    Cyber Leaders Panel Discussion: Zero Trust

    Government and nonprofit leaders from the CISA, OIG, and DOC join industry leaders from Forcepoint, Fidelis Cybersecurity, and Forward Networks to discuss how zero trust architecture is changing government cybersecurity.


    • Cybersecurity , All
  • ServiceNow_FNN_banners_482x224.jpg

    Agencies Must Lean on Technology to Improve Employee Connections, Collaborations

    Kevin Brooks, Principal Digital Strategist for DoD and US Intelligence Community at ServiceNow, explores how agencies need to recognize the need to do more to care and support their employees.


    • Customer Experience, ServiceNow
  • FCW_Cybersecurity_full_report_thumbnail.jpg

    The Ongoing Quest for Cybersecurity

    As threats evolve and networks expand, the need to transform the government’s cybersecurity strategies has never been more urgent.


    • Cybersecurity , All
  • FCW_Cybersecurity_stage_setter_thumbnail.jpg

    Taking Aim at a Moving Cyber Target

    Agencies are in search of ways to secure networks that are as fluid as the cyber world in which they operate.


    • Cybersecurity , All
  • FCW_Cybersecurity_sentinelone_vendor_article.jpg

    The Future of Cybersecurity is Autonomous

    AI can counter an attack faster than humans — and tip the scales back to the side of network defenders.


    • Cybersecurity , SentinelOne
  • FCW_Cybersecurity_forecpoint_vendor_article.jpg

    Tailoring Zero Trust to Individual Users

    By understanding normal behavior, agencies can develop more granular cybersecurity strategies and control.


    • Cybersecurity , Forcepoint
  • FCW_Cybersecurity_blackberry_vendor_article.jpg

    Modernizing Security for a Mobile Workforce

    Agencies need to redirect their security efforts to keep pace with the changes and movements of the workforce.


    • Cybersecurity , BlackBerry
  • FCW_Cybersecurity_nowsecure_vendor_article_.jpg

    The Dangers that Lurk in Mobile Apps

    Most agencies are overlooking a significant source of threats to their employees and data.


    • Cybersecurity , NowSecure
  • FCW_Cybersecurity_cloudera_vendor_article.jpg

    Why Data is a Critical Cybersecurity Tool

    AI-powered analysis of system data can help agencies strengthen their response to cyberthreats.


    • Cybersecurity , Cloudera
  • FCW_Cybersecurity_rubrik_vendor_article.jpg

    Zero Trust Data Management Foils Ransomware Attacks

    By following certain best practices, agencies can ensure their data is secure and instantly available.


    • Cybersecurity , Rubrik
  • FCW_Cybersecurity_solarwinds_vendor_article_.jpg

    Reclaiming Control Over Complex IT Environments

    The pandemic sent government employees home to work remotely, and we can expect to see a mixed workforce in the future as the public and private sectors adapt to allowing people to work from wherever they happen to be.


    • Cybersecurity , SolarWinds
  • FCW_Cybersecurity_thales_vendor_article.jpg

    The Role of Authentication in Data Protection

    Agencies are shifting from defending a network perimeter to making risk-based decisions about access.


    • Cybersecurity , Thales TCT
  • FCW_Cybersecurity_forward_networks_vendor_article.jpg

    Verification and Validation to Enhance Zero Trust

    Protecting government systems in today’s ever-evolving threat landscape requires agencies to maintain a deep understanding of their networks and the efficacy of their zero trust architecture.


    • Cybersecurity , Forward Networks
  • ← Previous
  • 1
  • 2
  • 3
  • 4
  • 5 (current)
  • 6
  • 7
  • 8
  • …
  • 39
  • Next →
About

We are proud to offer solutions and expertise to inspire and enable innovation, making government more open, responsive and secure.

carahsoft carahsoft
Recent Posts

The ARP ESSER Impact on Tech Companies and the EDU Sector

May 13, 2022

Why Artificial Intelligence Is Key to a High-Performing, Data-Centric Joint All-Domain Command and Control (JADC2) Strategy

April 27, 2022
Contact
11493 Sunset Hills Road
Suite 100
Reston, Virginia 20190
7x24@carahsoft.com 888-662-2724

© 2022 Carahsoft Technology Corp. All rights reserved.