Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Learn

Events

Archived Events

Symantec-Broadcom.png
Symantec Webcast

Event Date: August 22, 2019
Hosted By: Symantec & Carahsoft
Attendees of this complimentary webinar discussed Zero Trust Access principles and how Symantec's SaaS solution, Secure Access Cloud, can:Improve security posture with a Zero Trust Access SolutionReduce complexity with an agentless, cloud-delivered access ...

Symantec-Broadcom.png
Symantec Webcast

Event Date: August 01, 2019
Hosted By: Symantec & Carahsoft
Attendees of this webinar heard Matthew Gaehring, Security Systems Engineer at Symantec, discuss how you can protect your agency from a vast cyber threat landscape by:Enhancing your security efficacyDefending your mobile devicesControlling your applicationsDetecting ...

Symantec-Broadcom.png
Symantec Webcast

Event Date: June 18, 2019
Hosted By: Symantec & Carahsoft
Attendees of this event learned how Data Loss Prevention:Discovers where data is stored across all of your cloud, network, endpoint, and storage systemsMonitors how data is being used, whether your employees are on or off the ...

Symantec-Broadcom.png
Symantec Webcast

Event Date: May 21, 2019
Hosted By: Symantec & Carahsoft
Attendees of this complimentary webinar heard Symantec Sr. Federal Systems Engineer Chad Knupp discuss the current malware and phishing landscape and how Symantec Web Isolation can help by providing:Isolated web

Symantec-Broadcom.png
Symantec Webcast

Event Date: April 23, 2019
Hosted By: Symantec & Carahsoft
Attendees of this webinar learned more about how the SSL Visibility Appliance, the leading purpose-built appliance for encrypted traffic management, can help their agency:Enable secure SSL/TLS inspection and preserve data integrityImprove the ROI of your entire security infrastructurePreserve ...

Symantec-Broadcom.png
Symantec Webcast

Event Date: March 26, 2019
Hosted By: Symantec & Carahsoft
Attendees of this complimentary webinar learned about Symantec Security Analytics, an integral part of the Symantec Incident Response solution. This powerful tool closes the security gap and overcomes the major challenges of preparing for the unknown and protecting against ongoing attacks, ...

Symantec-Broadcom.png
Symantec Webcast

Event Date: February 21, 2019
Hosted By: Symantec & Carahsoft
Attendees of this webinar learned how they can take full advantage of Symantec Endpoint Protection Mobile: the most comprehensive, highly accurate, and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and ...

Symantec-Broadcom.png
Symantec Webcast

Event Date: January 24, 2019
Hosted By: Symantec & Carahsoft
The event has unfortunately passed.  At the event, individuals discussed how you can take full advantage of CloudSOC CASB.  To view all future events click here.

Symantec-Broadcom.png
Symantec Webcast

Event Date: December 18, 2018
Hosted By: Symantec & Carahsoft
The event has unfortunately passed.  At the event, individuals learned how to utilize Symantec Endpoint Protection, Advanced Threat Protection, and Endpoint Detection Response to prevent network threats.  To view all future events click

Symantec-Broadcom.png
Symantec Webcast

Event Date: November 29, 2018
Hosted By: Symantec & Carahsoft
This event has unfortunately passed. At the event, we discussed how Symantec Web Security Service can manage and control all of your devices, data, and applications to ensure you are safe from emerging threats.

Resources

Datasheet

Symantec-Broadcom.png
Symantec Datasheet
It's an exciting time in education. Teachers are leveraging technology for initiatives such as e-learning and flipped classrooms. Students are using smartphones, laptops, and tablets to conduct research, take tests, and team up on assignments via social media platforms. To help institutions embrace ...

Formerly Skycure Mobile Threat Defense, Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown thre...

Symantec-Broadcom.png
Symantec Datasheet
Symantec CloudSOC Audit discovers and monitors all the cloud apps being used in your organization and highlights any risks and compliance issues they may pose. View our datasheet to learn more.

To secure physical and virtual servers, IT professionals have relied on traditional protection technologies such as antivirus. While these remain essential layers of defense and hygiene, today’s threat landscape warrants augmenting with real-time and proactive security to provide sufficient protecti...

Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It’s time to move beyond antivirus. Symantec’s unique ability to provide intelligent security leverages the collective wisdom of the world’s lar...

Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high1. The threat environment is evolving quickly and given the size and complexity of today's networks, organizations are struggling to keep up. Symantec™ Endpoint Protection ...

Are you paying for unused software licenses? Are you prepared for your next vendor software audit? Take control with Symantec™ Asset Management Suite 7.6 powered by Altiris™ technology. In combination with Symantec™ Client Management Suite 7.6 powered by Altiris™ technology...

Smart, comprehensive email security—whether your email system is on-premises, cloud-based, or both—begins with a clear, realistic understanding of what you’re up against. Email is still the most popular and pervasive tool cybercriminals use to launch and distribute threats including spear phishing, ...

As agencies migrate email to the cloud—a move viewed by the administration as an integral element of modernization—cyber security must be part of the strategy. Although malicious actors now exploit a growing range of attack vectors, email remains by far the most popular.View this data sheet to learn...

Infographic

When it comes to responding to the current cyber threat landscape, innovation is a must. The problem is not just that threats are growing more numerous and sophisticated, it’s also that agencies have an increasingly complex environment to secure. Each aspect of the enterprise—from the data center an...