Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

JuniperNetworks-microsite.png
Juniper Networks

The Skinny: Ransomware Defense & Incident Response


Event Date: November 14, 2024
Hosted By: Juniper & Carahsoft
View this on-demand webinar where attendees heard Juniper's Mark Harman and Ben Caruso discuss:
 
  • An introduction to ransomware and its impact on SLED organizations
  • Best practices for defense
  • How to create an effective incident response plan
  • How to address the ransom payment decision
  • Building an incident response playbook aligned with frameworks like StateRAMP and NIST

Fill out the form below to view this archived event.


Resources


Featured

CipherDriveOne datasheet describing how a unified encryption suit can safeguard your sensitive information with ease as a pre-boot Authorization Acquisition (AA) host Software that manages a hardware Encryption Engine (EE).

Learn how DAE for SAP can help your organization secure sensitive data, streamline compliance, and improve operational efficiency, read the full datasheet.

This Dell Technologies resource outlines their approach to delivering comprehensive solutions tailored to customer outcomes, particularly in the federal and defense sectors. It emphasizes the integration of cutting-edge technologies and partnerships to address evolving challenges like security, digi...

Automate Threat Advisories and Post-hoc Detection for Cyber Rapid Response.

SBOM Manager
Datasheet
Stay compliant with regulations and ahead of industry trends by gaining immediate insights into your SBOM portfolio. Empower your team to ingest, generate, store, manage, monitor and distribute SBOMs for the software you build, OSS you use, and 3rd party vendor applications—all in one place with Son...

Achieve Complete Visibility, Behavior Analytics and Real-Time Reports for Your Zscaler Log Data.

SentryCard is created for organizations that need absolute certainty about who is entering their facilities, accessing their devices, or logging into their websites.

When the U.S. Army looked into technology that could spot funds with the potential to be lost due to expiring contracts, it tapped AI to find contracts with unused funds, empowering contracting officers to reclaim the money and reallocate it to other vital areas—boosting the deobligation rate ...

 Discover how the Axway VA Suite offers a versatile and robust certificate validation solution for both standard and custom desktop and server applications.

Aqua’s Cloud Native Application Protection Platform (CNAPP) protects your cloud native applications with a single, unified solution throughout their entire lifecycle. Unifying key security capabilities, CNAPP can protect against both known and unknown threads using a combination of shift-left ...