Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Learn

Events

Upcoming Events

Microsoft Virtual Event

Event Date: January 19, 2021
Hosted By: FCW
The global information technology supply chain has been hit with a growing and unprecedented number of attacks as adversaries attempt to compromise systems with various forms of malware in an attempt to steal or compromise or hold for ransom sensitive information.Federal executives realized how ...

small.png
Forescout Technologies Inc Carahsoft SE Webinar

Event Date: January 19, 2021
Hosted By: Forescout & Carahsoft
In this event, current Forescout users will have an open conversation with Carahsoft Demo Jocks and Forescout's SE to exchange tips and tricks and ask questions about their deployments.As Forescout's public sector distributor, Carahsoft believes our commitment to customers should not end ...

Black_Corp_Transparent_Logo.png
Multi-Vendor Webcast

Event Date: January 19, 2021
Hosted By: VMware, ReSTNSX & Carahsoft
Join VMware, ReSTNSX, and Carahsoft to hear how ReSTNSX can improve your organization’s VMware NSX environment. Learn how to simplify and automate NSX deployments, operations, and migrations to VMware NSX-T with the ReSTNSX ...

SentinelOne-microsite.png
SentinelOne Webcast

Event Date: January 19, 2021
Hosted By: SentinelOne & Carahsoft
Federal System Integrators supporting government customers across the country are leveraging Okta’s Identity Cloud Platform, a FedRAMP Authorized platform to deliver highly scalable access-management solutions to meet their customer’s mission goals and ...

Zscaler-Logo.png
Zscaler Webcast

Event Date: January 20, 2021
Hosted By: Carahsoft & Zscaler
With 171 controls and five levels of compliance, organizations contracting within the defense industry will need well-considered policies, procedures, and technological safeguards to adequately meet CMMC requirements. Ridge IT Corporation can bring your company into compliance with an innovative portfolio of technology ...

f5.png
F5 Networks Webcast

Event Date: January 20, 2021
Hosted By: F5 Networks & Carahsoft
Join F5 and Carahsoft to hear from Dan Woods, head of the Shape Security Intelligence Center and former CIA and FBI special agent, then participate in a facilitated roundtable discussion with fellow security leaders.Topics include, but are not limited to:Separating fake users from real ...

Multi-Vendor Webcast

Event Date: January 20, 2021
Hosted By: Carahsoft, Trustwave & Palo Alto Networks
Right now, state and local government and educational institutions are trying to maximize their budgets at ...

smaller-Infoblox-Logo.png
Infoblox Webcast

Event Date: January 20, 2021
Hosted By: Carahsoft
Interested in learning more about Infoblox?

small.png
Forescout Technologies Inc Webcast

Event Date: January 21, 2021
Hosted By: Forescout
During the New Era in DODIN Security digital event, learn from DoD Leaders how Comply-to-Connect (C2C) is rolling out across the DoD Enterprise to make cybersecurity move effectively and efficiently. Tune in as defense experts take a deep drive into the Comply-to-Connect program and what it means for the future of ...

eclypsium_logo_microsite.jpg
Eclypsium Webcast

Event Date: January 21, 2021
Hosted By: Eclypsium & Carahsoft
Eclypsium, working with Advanced Intelligence, disclosed the discovery of this new module, dubbed TrickBoot, in December. The new functionality performs reconnaissance on target devices, identifying the device platform, the status of BIOS write protections for the SPI flash, and well-known vulnerabilities that can allow ...

Resources

Featured

new-fireeye.png
FireEye Datasheet
Traditional endpoint protection leaves gaps as it tries to address modern threats. FireEye Endpoint Security improves security visibility and the quality and relevance of your threat data.

palo-alto-networks-microsite-01.jpg
Palo Alto Networks Datasheet
Organizations worldwide are expanding their cloud and virtualization initiatives beyond traditional data center and public cloud deployments. New initiatives include security as an NFV component or as a more complete multi-tenancy solution. The VM-Series supports the same next-generation firewall an...

Seagate_Government_Logo-2color-horizontal.png
Seagate Government Solutions Industry Study
Now more than ever, enhanced data security is a necessity for government agencies and contractors. As such, we need to go beyond safeguarding systems—security must start at the drive level. Seagate® TAA and FIPS-compliant hard drives and SSDs answer this need, addressing every step of the supply ...

fidelisdetect_program_overview.jpg
Fidelis Cybersecurity Product Brief
FidelisDetect Insider Threat Data Exfiltration Assessment. Do you know what's leaving your network?

AtHoc_Horizontal_Lockup.png
BlackBerry AtHoc Product Brief
When emergencies strike, AtHoc provides a seamless and trusted exchange of critical information between organizations, their people, devices, and any external entity. That’s essential, as no event occurs in isolation. We call that networked crisis communication, a field AtHoc pioneered and is r...

Learn how HyTrust balances the clash of missions between security and IT Ops teams with automation in this article.

CIS_Master_Logo_N0_BG_RGB_R.PNG
Center for Internet Security, Inc. (CIS) Resources
Albert is a unique network monitoring solution that provides automated alerts on both traditional and advanced network threats. Albert is a cost-effective IDS monitoring solution with a unique, SLTT-focused signature set that is monitored by a 24x7 Security Operations Center (SOC).

palo-alto-networks-microsite-01.jpg
Palo Alto Networks Resources
Palo Alto Networks(r) Security Operating Platform prevents successful cyberattacks by harnessing analytics to automate routine tasks and enforcement. Tight integration across the platform, and with partners, simplifies security so you can secure users, applications and data.

new-fireeye.png
FireEye Resources
In this M-Trends 2018 report, we look at some of the latest trends identified during the October 1, 2016 to September 30, 2017 reporting period, as revealed through incident response investigations by Mandiant, a FireEye company.

logo_splunk_1color_K.JPG
Splunk Solutions Brief
Check out this solution guide to learn how machine data can help find anomalies and fight fraud!