Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Splunk-New-Microsite-logo.png
Splunk

Splunk ESI Contract and Navy


Event Date: May 07, 2020
Hosted By: Splunk, True Zero Technologies & Carahsoft
Navy has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.

During this webinar, participants discussed:
  • How the contract has been structured
  • The value it brings to Navy
  • How to leverage the contract

Fill out the form below to view this archived event.


Resources


Datasheet

Forescout eyeControl enables organizations to automate network access control and enforce security policies in real time, ensuring only compliant and authorized devices connect to the network. By integrating with existing security tools, eyeControl orchestrates dynamic responses to security threats,...

Read this datasheet and discover more about reducing risk, automating compliance, and optimizing threat analysis for OT and ICS environments.

Check out this cheat sheet on all things OT security from Forescout.

Look at this Cheat Sheet about Network Security from Forescout.

Read this Threat Detection & Response (TDR) solution cheat sheet from Forescout.

Enhance your network security posture with risk-based prioritization

Forescout CounterACT® Provides Queens College with improved Network Visibility, Asset Intelligence and Complaince

Presentation

Modern NAC
Presentation
Agentless, flexible and non-disruptive Zero Trust security for your Enterprise of Things.

Report

A benchmarking system to spark companies to action - innovation that fuels new deal flow and growth pipelines.

Resources

Forescout’s Vedere Labs has discovered a set of 56 vulnerabilities affecting devices from 10 operational technology (OT) vendors caused by insecure-by-design practices in OT. The vulnerabilities are divided into four main categories: insecure engineering protocols, weak cryptography or broken authen...