Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Verkada-microsite.png
Verkada

Smart Policing in Action: How the City of Tucson Built a Unified Operating Picture


Event Date: October 21, 2025
Hosted By: Verkada & Carahsoft
As Arizona’s second-largest city and the seat of Pima County, Tucson is home to more than a million residents and over 7 million annual visitors. It’s a destination city with a busy civic calendar, where the University of Arizona anchors a daily influx of 50,000+ students, staff, and visitors. For the Tucson Police Department (TPD), that mix means daily operations, large planned events, and critical incidents, often at the city scale.

In October 2024, TPD launched the Community Safety Awareness and Response Center (CSARC) to deliver credible, real-time intelligence to officers, detectives, and community partners. Lieutenant Don Jorgenson, who leads the Crime Analytics Section within the Analysis Division, oversees CSARC and the Link Analysis and Strategic Operations (LASO) unit—data analysts who connect people, places, and cases.

View the webinar recording to hear from Lieutenant Jorgenson on how Tucson transformed the way city agencies collaborate, respond, and overcome disorganization.

During this webinar, you learned:
  • How to eliminate information silos: leveraging one pane of glass for IT, Security, and Operations to create a unified source of truth and faster response times.
  • The keys to scaling a city: common barriers and obstacles between departments and how to overcome them with efficient communication.
  • The benefits of smart policing: from NCIC alerts on stolen vehicles to faster investigations, learn real-time methods of success from RTCCs and smart policing.

Fill out the form below to view this archived event.


Resources


Illumio Core for Federal Agencies
Solutions Brief

Illumio Core for Federal Agencies

Illumio CoreTM delivers real-time application dependency mapping and micro-segmentation by programming the native Layer 3/Layer 4 firewall of each host. Illumio uses an allow-list model, which means that all traffic is blocked by default. This approach prevents lateral movement of cyberattacks, obstructs ransomware, and enables Zero Trust across on-premises data centers, public clouds, private clouds, and containers. Download this Solution Brief to learn more about Illumio Core!


Fill out the form below to view this Resource.