Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Learn

Events

Centrify-Zero-Trust-Privilege-Logo-red-CYMK-EPS.gif
Centrify Webcast

Shake It Up with Centrify


Event Date: June 22, 2021

Elevate your at-home cocktail-making and cooking skills just in time to kick off summer at this fun and interactive class designed for information security professionals. Learn about the tools, techniques, and recipes mixologists and chefs use from your very own kitchen.

Watch the recording to learn how to prepare a New York strip on roasted sweet potato and broccolini, topped with chimichurri sauce paired with a casino! Don't drink alcohol or you have dietary restrictions? Don't worry, our experts have provided substitutions for a customized meal.

Fill out the form below to view this archived event.


Resources

Case Study

Ensure easy CAC smart card authentication across all Windows and Linux systems. Eliminate the need to provide root access to end users, with a FIPS 140-2 certified solution in accordance with HSPD-12 regulations.

The Department of Technology, Management and Budget (DTMB) is an arm of the Michigan State government responsible for the management of technologies for 19 peer agencies and several non-governmental entities.DTMB selected Centrify Zero Trust Privilege Services to help meet federal/industry complianc...

Datasheet

For privileged sessions, it is of course best practice to audit everything. With a documented record of allactions performed, audit logs not only can be used in forensic analysis to find exactly the issue, but alsoto attribute actions taken to a specific user. Because these sessions are so critical,...

databases, and network devices which all resided inside a well-defined boundary. Nowadays, privileged accessmanagement (PAM) must handle requesters that are not only human but also machines, services, and APIs.There will still be shared accounts, but for increased assurance, best practices now recom...

Centrify-Zero-Trust-Privilege-Logo-red-CYMK-EPS.gif
Centrify Datasheet
As organizations continue their digital transformation journeys, they struggle to manage an infrastructure that is fragmented across hybrid- and multi-cloud environments, resulting in data breaches, audit findings, and unnecessary overhead costs.Centrify enables digital transformation at scale, mode...

Over the past few years, it’s clear that attackers are no longer “hacking” in for data breaches: theyare simply logging in using weak, stolen, or otherwise compromised privileged credentials. Oncein, they take advantage of the fact that many organizations assign too much standing privilegeto their a...

Zero Trust Privilege controls need to be adaptive to the risk-context. Gartner promotes CARTA – Continuous,Adaptive, Risk, and Trust Assessment – and it’s absolutely required for privileged access too. Zero TrustPrivilege means knowing that even if the right credentials have been entered by a privil...

Over the last few years, it’s become evident that cyber-attackers are no longer “hacking” tocarry out data breaches — they are simply logging in by exploiting weak, default, stolen, orotherwise compromised privileged credentials. To add to this challenge, the attack surface oforganizations has chang...

For privileged sessions, it is of course best practice to audit everything. With a documented record of allactions performed, audit logs not only can be used in forensic analysis to find exactly the issue, but alsoto attribute actions taken to a specific user. Because these sessions are so critical,...

E-Book

Explore Zero Trust Privilege use cases, asses your Zero Trust Privilege maturity level, and create a road map to Zero Trust Privilege.