Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Archived Events

salesforce_logo_updated.png
Salesforce Virtual Event

Event Date: April 25, 2023
Hosted By: LNB Solutions & Carahsoft
In this webinar attendees explored how the latest developments in technology are transforming the way human and social services agencies operate, saving workers time and resources, and increasing efficiency.   We introduced Kinship, the enterprise modular Case Management, ...
salesforce_logo_updated.png
Salesforce Virtual Event

Event Date: April 12, 2023
Hosted By: Salesforce
Attendees hear from Eva Skidmore, VP of Public Sector, Salesforce, Linwood Weatherington, Security Specialist, Salesforce and practitioner Philip Huang, Director/Health Authority, Dallas County Health and Human Services Department explore how to uncover new ways to effectively engage with customers while ...

Resources


Logo-PingIdentity-ForgeRock-Hor-FullColor.png
Webinar

A New Era: Maximize Zero Trust with AI-Driven Role Management

With growing cyber threats, organizations face mounting pressure to enforce Zero Trust principles, like least privilege access. But traditional IGA solutions rely on manual, labor-intensive processes that can no longer scale to meet today's dynamic security requirements. It's time for a better solution.

With a unique approach to applying AI and machine learning (ML) to enterprise-wide identity data, ForgeRock can power your Zero Trust solutions and help you finally achieve least privilege. Now you can apply this same technology to solve one of your toughest IAM governance challenges: Role-based Access Control (RBAC).

Join this webinar to learn how your organization can quickly scale Zero Trust and achieve least privilege by modernizing your RBAC implementation with an AI-driven solution designed specifically for the IAM world. Add to any existing IGA solution. No data scientist required.

  • Discover and analyze role access patterns across your entire enterprise
  • Customize risk criteria according to your organization specific needs
  • Gain visibility into existing user access and the associated risk levels
  • Automate the definition and creation of roles in days, not years

Fill out the form below to view this Resource.