Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.



Symantec Webcast

Connect with Carahsoft: Where is Your Customer's Confidential Data?

Event Date: May 14, 2013

Attendees of this webcast learned more on how Symantec's Data Loss Prevention software offers:

  • Protection of customer's most valuable asset: intellectual property
  • Increased visibility into business processes and compliance posture
  • Defense against the well-meaning, but malicious insider within the organization

Fill out the form below to view this archived event.



This infographic outlines how NVIDIA DGX Systems are essential instruments for AI research built on the new NVIDIA Volta GPU Platform.

Citizens are embracing digital self-service. Your agency should too. Citizens are interested in government self-service portals for one very important reason- convenience. Read more to see why agencies should offer self-service...

Red Hat Infographic
Discover how Red Hat helps agencies optimize their current infrastructure and frees teams to focus more on initiatives, not day-to-day maintenance.

Veritas Technologies Infographic
Ransomware has quickly emerged as one of the most dangerous cyberthreats facing both organizations and consumers, with global losses now likely running to billions of dollars each year. Adopting a unified approach to backup helps ensure you are protected, regardless of where your data resides.View t...

Every agency is scaling up telework to keep the public sector workforce healthy and productive. MeriTalk, in partnership with Okta, explored recommendations for secure telework across Federal, State, and Local organizations to discover what immediate challenges agencies face, and how they can a...

“Never trust; always verify,” is emerging as the new slogan for information security in a cloud-based world. At its core is Zero Trust – the idea that access to agency resources should be restricted until the user has proven their identity and access permissions, and the device has passed a ...

The lifecycle of automating compliance includes four parts: define the standard, assess the environment, remediate the environment, and refine the standard. Learn more with this infographic.

SailPoint Technologies Infographic
As IT environments grow more complex, it becomes virtually impossible to track ever-changing relationships between users, devices, managed accounts, and their corresponding levels of access. The lack of transparent visibility puts enterprises at risk of security breaches and failed audits.