Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

f5-logo-rgb_transparent.png
Multi-Vendor Onsite Event

Event Date: September 14, 2022
Hosted By: F5, Red Hat & Carahsoft
Location: Montgomery, AL
 Have you ever wondered where you are along the DevOps journey? What lessons have you re-learned since building your first container or how you can continue to secure your Kubernetes environment? What kinds of obstacles should you expect in the future and how can you plan to move past ...
Logo-redhat-color-375.png
Red Hat Virtual Event

Event Date: September 07, 2022
Hosted By: Red Hat & Carahsoft
Enterprise-wide automation has become a necessity to keep pace with the evolving demands of modern IT. As security threats grow and workloads scale in complexity,  federal government agencies require a simple but robust automation solution.
Logo-redhat-color-375.png
Multi-Vendor Virtual Event

Event Date: August 31, 2022
Hosted By: Red Hat & Carahsoft
Digitalization has become a core pillar in executing the mission and vision for the future of IT. When you modernize your team’s workflow with automation, processes that usually take days and hours can be completed in just a few moments, freeing up development time. Red Hat experts displayed ...
Logo-redhat-color-375.png
Red Hat Virtual Event

Event Date: August 23, 2022
Hosted By: Red Hat & Carahsoft
Managing enterprise-wide processes and operations can be a monumental challenge for public sector IT organizations. Siloed teams, non-integrated systems and legacy infrastructures hinder collaboration and often create bottlenecks.What if there was a single strategy to overcome ...
Logo-redhat-color-375.png
Red Hat Virtual Event

Event Date: August 23, 2022
Hosted By: Red Hat & Carahsoft
Regardless of where you are on your IT modernization journey, creating an enterprise-wide approach to automation can help you streamline not only IT processes, but also entire technologies, teams and organizations. Red Hat Ansible provides ...
Logo-redhat-color-375.png
Red Hat Virtual Event

Event Date: August 03, 2022
Hosted By: Red Hat & Carahsoft
Enterprise-wide automation has become a necessity to keep pace with the evolving demands of modern IT. As security threats grow and workloads scale in complexity,  federal government agencies require a simple but robust automation solution.Red Hat Ansible helps the U.S. Department of Homeland ...
Logo-redhat-color-375.png
Red Hat Virtual Event

Event Date: July 26, 2022
Hosted By: Red Hat & Carahsoft
Federal scientific agencies require robust software capabilities to carry out their agency-specific missions and day-to-day operations. Enterprise-wide automation has become a necessity to keep pace with the evolving demands of modern IT. Red Hat Ansible is uniquely positioned to help your agency succeed with simple, ...

Resources


Datasheet

Forescout eyeControl enables organizations to automate network access control and enforce security policies in real time, ensuring only compliant and authorized devices connect to the network. By integrating with existing security tools, eyeControl orchestrates dynamic responses to security threats,...

Read this datasheet and discover more about reducing risk, automating compliance, and optimizing threat analysis for OT and ICS environments.

Check out this cheat sheet on all things OT security from Forescout.

Look at this Cheat Sheet about Network Security from Forescout.

Read this Threat Detection & Response (TDR) solution cheat sheet from Forescout.

Enhance your network security posture with risk-based prioritization

Forescout CounterACT® Provides Queens College with improved Network Visibility, Asset Intelligence and Complaince

Presentation

Modern NAC
Presentation
Agentless, flexible and non-disruptive Zero Trust security for your Enterprise of Things.

Report

A benchmarking system to spark companies to action - innovation that fuels new deal flow and growth pipelines.

Resources

Forescout’s Vedere Labs has discovered a set of 56 vulnerabilities affecting devices from 10 operational technology (OT) vendors caused by insecure-by-design practices in OT. The vulnerabilities are divided into four main categories: insecure engineering protocols, weak cryptography or broken authen...