Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

FortinetFederal-microsite.png
Multi-Vendor

Visibility to Zero Trust: Enable Federal Agency Cybersecurity at Scale


Event Date: February 17, 2026
Hosted By: Fortinet Federal, Garland Technology & Carahsoft
View our on-demand webinar with Fortinet Federal and Garland Technology to ensure federal agencies have robust cybersecurity and strong Zero Trust strategies. Do you have the proper tools in your cybersecurity toolbox for today’s cyber threats?
 
Advances in technology like AI have enabled cyberattacks to be larger and more complex. For your federal network, this means it is critical to have cybersecurity solutions that provide visibility and scalability to handle advanced threats. Hear from our expert speakers on how Garland Technology’s network TAPs, Packet Brokers and bypass solutions sit in physical networks to provide lossless, unfiltered copies of traffic to Fortinet devices.
 
In the on-demand event, learn how pairing Fortinet Federal and Garland Technology solutions can:
  • Increase visibility across large federal networks.
  • Scale the capabilities of your cybersecurity.
  • Strengthen your Zero Trust security strategy.

Fill out the form below to view this archived event.


Resources


MarkLogic_microsite__slate_larger.png
Datasheet

MMIS Modernization Data Sheet

To improve the delivery of healthcare services and meet requirements for health data interoperability, technology leaders of state health and human service departments need to modernize their aging Medicaid Enterprise Systems (MES). This 2-pager provides an overview of the MarkLogic Data Hub for Medicaid, which combines an Operational Data Store (ODS) and Master Patient/Provider Index (MPI) that allows states to confidently accelerate migration of legacy data to a more modern platform that simplifies data integration while future-proofing IT architecture.


Fill out the form below to view this Resource.