• 888.662.2724
  • sales@carahsoft.com
  • Request A Quote
  • Join Our Team
  • Accessibility
  • Chat With Us
Advanced Search
Search Form
About Carahsoft Awards News
Carahsoft Carahsoft
Menu
  • Solve
    • Technology Vendors
    • VMware
    • Adobe
    • Symantec
    • Palo Alto Networks
    • Veritas
    • McAfee
    • Dell EMC
    • Micro Focus
    • SAP
    • SAP NS2
    • Red Hat
    • F5 Networks
    • Salesforce
    • Splunk
    • FireEye
    • ServiceNow
    • Google Cloud
    VIEW ALL VENDORS >
    • Solution Sets
    • FedRAMP
    • Big Data
    • Cybersecurity
    • Cloud Computing
    • Citizen Experience
    • Geospatial
    • In-Q-Tel / a16z
    • Mobility
    • Open Source
    • Virtualization
    • Law Enforcement
    • Machine Learning & AI
    • Internet of Things
    • Healthcare
    • 21st Century IDEA Solutions
    Partner Solutions Portfolio
  • Learn
    • Resources
    • Events
    • Resources
    • Community Trends
    • Innovation in Government®
  • Buy
    • Contracts
    • GSA Schedule
    • SEWP
    • ESI BPA
    • Other Federal IDIQ/GWAC
    • Army CHESS ITES-SW
    • State & Local
    • Education
    • CDM
    • AWS Marketplace
    • OTA
  • Partners
  • Contact Us
  • About

Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Learn

Upcoming Events

Saviynt Converge '19

December 09, 2019

SolarWinds Florida TechDay

December 10, 2019

Salesforce Atlanta Innovation Day

December 10, 2019 at 8:00 AM ET

FSI Onsite Event

December 10, 2019 at 8:00 AM ET

Filter by Featured Vendor

Clear Filter
  • All
  • VMware
  • Veritas
  • Adobe
  • Symantec
  • Dell EMC
  • Micro Focus
  • SAP
  • Red Hat
  • F5 Networks
  • Salesforce
  • Splunk
  • FireEye
  • ServiceNow
  • Google Cloud
  • McAfee
  • SAP NS2

Filter by Solution

Clear Filter
  • Big Data
  • Cybersecurity
  • Cloud Computing
  • Citizen Engagement
  • Geospatial
  • Intelligence
  • Mobility
  • Open Source
  • Virtualization
  • FedRamp
  • Events
  • Resources

Events

CyberArk200x250.fw.png
CyberArk Other

European Identity & Cloud Conference 2016


Event Date: May 10, 2016
Hosted By: CyberArk
Location: ?Dolce BallhausForum, GA

Enabling Agility and Innovation in the Age of Digital Transformation

The European Identity & Cloud Conference 2016, taking place May 10 – 13, 2016 at the Dolce Ballhaus Forum Unterschleissheim, Munich/Germany, is Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. For the 10th time KuppingerCole brings together exhibitors and more than 600 participants including most of Europe’s and the world’s leading vendors, end users, thought leaders, visionaries and analysts.

New Security challenges are arising as business undergoes a Digital Transformation where everything is ever-changing and innovation happens at high speed.

At EIC 2016 you will experience how Security and Privacy by Design build the foundation for agile business. Listen to leading experts in IAM and Information Security talking about best practices and ways to effectively mitigate future Digital Risks for your enterprise. Be inspired by a forward-thinking, worldwide community. The Conference offers a world class list of speakers and a unique mix of best practices, presentations, panel discussions, thought leadership and analyst views.

Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? ORDER BY FeaturedBit DESC, Type ASC

Resource

CyberArk200x250.fw.png
Resource
CyberArk Webcast 30 Day Cybersecurity Sprint - Tightening Privileged User Policies
This webinar focuses on The White House’s recent “30-Day Cyber Security Sprint”, specifically on how to tighten policies and practices for privileged users and addressing insider threat.The webinar focuses on specific guidelines from the White House document that CyberArk’s Privileged Accoun...
READ MORE >

CyberArk200x250.fw.png
Resource
Pass-The-Hash Solution Brief
Pass-the-Hash, an attack leveraging stolen credentials, is often used in advanced threats and represents a significant risk to organizations. This technique involves an attacker stealing account credentials from one computer, and using them to authenticate to other access points in a network. Inst...
READ MORE >

CyberArk200x250.fw.png
Resource
Privileged Session Manager Overview
Isolate, control and monitor all privileged administrator sessions to protect your databases, virtual environments, network devices and servers from insider threats and external cyber attacks and provide proof to your auditors around privileged session activity.
READ MORE >

CyberArk200x250.fw.png
Resource
The CyberArk Privileged Account Security Solution
Malicious hackers are wreaking havoc across the globe with advanced cyber attacks that are well planned, sophisticated, and directly targeted at the most valuable core assets of an enterprise. The outsiders are breaking through the perimeter and endpoint defenses and gaining internal access. Once ...
READ MORE >

Resources

CyberArk200x250.fw.png
Resources
CyberArk Company Overview
CyberArk (NASDAQ: CYBR) is the #1 provider in privileged account security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise-on premises, in the cloud, on endpoints, and throughout the DevOps pipeline. Privileged accounts, credentials, and secrets allow...
READ MORE >

CyberArk200x250.fw.png
Resources
Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Phase 2 Privilege Management Requirements
Time is ticking to meet the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Phase 2 Privilege Management requirements. The U.S. Department of Homeland Security is continuously looking for better ways to help federal agencies manage and secure their networks by providing...
READ MORE >

Solutions Brief

CyberArk200x250.fw.png
Solutions Brief
What Contractors Need to Know About the Department of Defense's Insider Threat Program
In October of 2011, the President of the United States of America signed Executive Order 13587 directing United States Government executive branch departments and agencies to establish, implement, monitor, and report on the effectiveness of insider threat programs
READ MORE >

CyberArk200x250.fw.png
Solutions Brief
Securing DOD Networks
CyberArk Solutions for Department of Defense CIO PrioritiesMitigate insider threats and meet CYBERCOM orders through seemless behavior analytics and privileged user/audit/monitoring capability Enforce mechanism for end to end multifactor authentication (CAC/PKI) for all privileged users and device...
READ MORE >

CyberArk200x250.fw.png
Solutions Brief
Securing the Cloud for the Federal Government
How CyberArk helps provide security in the cloud for the Federal governments most critical assets:Securing privileged access for devices (including: system, networking, and legacy) in the cloud with multi-factor authentication, including DOD CAC/ PKI Maintain 100% on DoD Scorecard reporting for pr...
READ MORE >

CyberArk200x250.fw.png
Solutions Brief
CyberArk Privileged Account Security Solution Integration with the Splunk Enterprise Platform
Today’s attacks are sophisticated and complex, using multiple vectors to get to sensitive data—privileged accounts are a critical vector attackers will target to move laterally or to establish command and control.CyberArk’s Privileged Account Security Solution integrated with the Splunk Enterp...
READ MORE >
< Previous12Next >
Contact Details
11493 Sunset Hills Road
Suite 100
Reston, Virginia 20190
Email:
sales@carahsoft.com
Phone:
703-871-8500
Toll Free:
888-662-2724
Fax:
703-871-8505
CONTACT US >
Latest Tweets

Request a demo

eNEWS SIGN UP

Subscribe for the latest news,
events, and updates from Carahsoft.

  • file30-MINUTE QUOTE Fast, accurate quote turnaround.
  • filePARTNER WITH US Join our dynamic partner ecosystem.
  • fileJOIN OUR TEAM Start your sales or marketing career now!
  • Home
  • Solve
  • Learn
  • Buy
  • Partners
  • About
  • Contact
  • Careers
  • Privacy

© 2019 Carahsoft Technology Corp. | All rights reserved

  • facebook
  • twitter
  • linkedin
  • youtube
  • community
Carahsoft eNews Signup