Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Learn

Events

Archived Events

msgs_blue_vert80.png
Micro Focus Government Solutions Webcast

Event Date: January 16, 2013
Hosted By: HP Software & Carahsoft
During this webcast attendees learned how to:Address immediate security issues in software you've already deployedPost-Form Description

Webcast

Event Date: January 15, 2013
Thank you for your interest!See firsthand as TerraGo co-founder and ...

Logo-redhat-color-375.png
Red Hat Webcast

Event Date: January 09, 2013
During this webcast our speaker, Sid Wilroy, Red Hat Solutions Architect, discussed how the Red Hat Storage Server is built on the industry leading Red Hat Enterprise Linux operating system. Red Hat Storage Server solved ...

Session 4: How to Manage and Scale Without Going Broke Learn how an open hybrid cloud approach allows freedom of choice across new and existing heterogeneous infrastructures.

Attendees of this webcast heard an informative discussion on mobile device security and learned more about how PaRaBaL's iOS and Android Certification and Security Training courses cover: Different hacking techniques used on mobile devices, like spoofing a geographic location and accessing information via SMS text ...

Event

Event Date: December 31, 1969
Government Technology’s passion is helping spread best practices and spurring innovation in the public sector. The Maryland Digital Government Summit is designed to do just that. The summit has an advisory board that gathers public sector and private sector leaders to create an agenda designed to make that passion relevant ...

Resources

01_Racktop_LogoRGB_FullColor_Horizontal.png
RackTop Systems Resources
The 5 Advantages of CyberConverged Data Security

Increased cyber threats and complex data compliance regulations are changing the way you run your business. CyberConverged data security combines data storage, compliance, and security into an easy to use integrated solution designed to meet these complex challenges head on. It is the most efficient and effective means to protect unstructured file data from insider threats, malware, and cyber attacks. In this modern IT era, it is the only way to effectively store data at scale while preventing it from being unknowingly altered, stolen, or destroyed.


Fill out the form below to view this Resource.