Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

CLB_logo_Tag_2color_pos_rgb.png
Cellebrite

Simplifying Your Digital Evidence Workflow


Event Date: August 20, 2020
Hosted By: Cellebrite & Carahsoft

Cellebrite is the global leader of Digital Intelligence solutions for the public and private sectors. Cellebrite delivers an extensive suite of innovative software solutions, analytic tools, and training designed to accelerate digital investigations. The recent acquisition of BlackBag Technologies positions Cellebrite to continue helping customers address the growing complexity of handling crime and security challenges in the digital era.

Do you find yourself trying to come up with a strategic approach to analyzing the various digital evidence for your cases? View this on-demand webcast as Cellebrite looks at how to use MacQuisition and analyze all your digital evidence under one case file. You will have the opportunity to learn about:

  • Macquisition demo of triage capabilities
  • BlackLight walkthrough of:
    • Cellebrite acquisition analysis
    • Mac and Windows artifacts to include the infamous keychain file
    • Berla analysis
    • iCloud production ingestion


Fill out the form below to view this archived event.


Resources


Comply-to-Connect: The Basis for Cybersecurity
Whitepaper

Comply-to-Connect: The Basis for Cybersecurity

Comply-to-Connect, or C2C, is the Department of Defense’s next major step forward in network security for all networks comprising the Department of Defense Information Network (DoDIN) and at both the non-classified and classified levels. C2C is a program that delivers capabilities to accomplish two primary goals:

  1. First, C2C fills existing capability gaps in currently fielded enterprise security solutions through complete device identification, device and user authentication, and security compliance assessment.
  2. Second, C2C automates routine security administrative functions, remediation of noncompliant devices and incident response through the integration of multiple management and security products and continuous monitoring.

Download PDF