Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.



No events were found. Please try another search.



This webinar focuses on The White House’s recent “30-Day Cyber Security Sprint”, specifically on how to tighten policies and practices for privileged users and addressing insider threat.The webinar focuses on specific guidelines from the White House document that CyberArk’s Privileged Account Securi...

Pass-the-Hash, an attack leveraging stolen credentials, is often used in advanced threats and represents a significant risk to organizations. This technique involves an attacker stealing account credentials from one computer, and using them to authenticate to other access points in a network. Inst...

Isolate, control and monitor all privileged administrator sessions to protect your databases, virtual environments, network devices and servers from insider threats and external cyber attacks and provide proof to your auditors around privileged session activity.


Agencies must secure themselves against malicious cyber attacks that can take cover behind insider privileges and go after critical assets. CyberArk leads the market by delivering a new category of targeted security solutions that help leaders prevent attack escalation before irreparable business...

CyberArk Resources
CyberArk (NASDAQ: CYBR) is the #1 provider in privileged account security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise-on premises, in the cloud, on endpoints, and throughout the DevOps pipeline. Privileged accounts, credentials, and secrets allow...

CyberArk Resources
Secure identities. Stop attacks.

Time is ticking to meet the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Phase 2 Privilege Management requirements. The U.S. Department of Homeland Security is continuously looking for better ways to help federal agencies manage and secure their networks by providing...

Malicious hackers are wreaking havoc across the globe with advanced cyber attacks that are well planned, sophisticated, and directly targeted at the most valuable core assets of an enterprise. The outsiders are breaking through the perimeter and endpoint defenses and gaining internal access. Once in...

Solutions Brief

In October of 2011, the President of the United States of America signed Executive Order 13587 directing United States Government executive branch departments and agencies to establish, implement, monitor, and report on the effectiveness of insider threat programs

Gartner estimates 80% of all data in the world is stored in files, and oftentimes, these files are stored in insecure locations. Furthermore, many state and local governments and agencies have no visibility into where these files reside, what each file contains and who can access this data.