Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.



Upcoming Events

Multi-Vendor Webcast

Event Date: June 23, 2021
Hosted By: SAP NS2, Splunk, GoSecure & Carahsoft
On June 23rd, join experts from SAP NS2, Splunk, and GoSecure as they discuss how you can strengthen your cyber defenses. In this session, attendees can expect to learn how to combat threats in real-time with advanced analytics allowing you to gain visibility into the activity happening across your cloud ...

Lookout Webcast

Event Date: June 23, 2021
Hosted By: Lookout & Carahsoft
Attendees of this webinar will hear the following topics:Zero Trust for Smartphones- Security & PrivacyColonial Pipeline attack- Phishing- Smartphones are vulnerableBYOD/Unmanaged Smartphone Protection – Complete Security neededVulnerable entry points into your ...

F5 Networks Webcast

Event Date: June 23, 2021
Hosted By: F5 & Carahsoft
As the Federal government continues to embrace modern application development processes, we are seeing an increased demand for NGINX expertise across the government, with open positions demanding experience. As a result, we are offering a new NGINX accreditation series. Join F5 and NGINX for a training focused ...

Multi-Vendor Webcast

Event Date: June 23, 2021
Hosted By: Yansa Labs & Carahsoft
As process and data consolidation increases in every organization, securing and segregating data becomes critical. Join Yansa Labs and Carahsoft for a webinar where we will show you the simplest, most efficient, and most maintainable way to keep your data in front of the appropriate audience. ...

FireEye Webcast

Event Date: June 23, 2021
Hosted By: FireEye & Carahsoft
CPE credit available
Even if you have checked all the cyber security boxes, your operational technology (OT) network may still be vulnerable. How close does an attacker have to be to your operations to cause a full shut down?While strides have been made to add OT protections, there are still gaps that beg the ...

Google Webcast

Event Date: June 23, 2021
Hosted By: Google & Carahsoft
The White House Executive Order on Improving the Nation's Cybersecurity - and its provisions on Zero Trust - are critical components of modernizing cybersecurity within the Federal Government. For DOE, escalating cybersecurity risks pose a growing threat to research communities and essential critical infrastructures. ...

AWS Webcast

Event Date: June 23, 2021
Hosted By: AWS & Carahsoft
Join this webcast to hear subject-matter experts discuss the features of VMware Cloud SDDC, including: Ability to create the target SDDC immediately prior to performing a ...

Tableau Webcast

Event Date: June 23, 2021
Hosted By: Carahsoft, Tableau, CBP & Grant Thornton
Federal agencies can integrate online data visualization techniques and digital experiences that weren't previously available, furthering public demand for data transparency. The recent passage of the Foundations for Evidence-Based Policymaking Act of 2018 (“Evidence Act”) codifies open data requirements, and ...

Splunk Webcast

Event Date: June 23, 2021
Hosted By: Splunk & Carahsoft
Splunk Synthetic Monitoring and Web Optimization combines the power of synthetic monitoring with an automated optimization engine to help organizations find, fix, and prevent the web performance issues impacting the user experience.Join us for a demonstration of how Splunk Synthetics can help your ...

Nuance Webcast

Event Date: June 23, 2021
Hosted By: Nuance & Carahsoft
What if there was a single platform that combined the latest artificial intelligence innovations, natural language understanding, and the best of assisted service to enable exceptional customer engagement across all touch points?Nuance delivers virtual assistants, live chat, and messaging from automated tools for the ...



When deploying web applications in Microsoft Azure®, the recommended approach for delivering scalability and resilience is to utilize the cloud infrastructure, as opposed to following a traditional, physical data center approach. By leveraging native Azure-managed load balancing services, organiz...

Udacity Resources
Cybersecurity is crucial for protecting employees and data in today’s remote work environment. In addition to the critical role it plays in enabling digital transformation, cybersecurity is one of the fastest-growing fields for businesses today.

This report covers the history of cloud-based backup and recovery, common (and uncommon) features and capabilities of the capability, as well as best practices recommendations for companies looking to evaluate and implement a cloud-based data protection solution.

Paving the way for innovation and supporting world-changing projects in government, education and nonprofit organizations.

NetAbstraction Resources
The sophistication of our cyber adversaries is increasing rapidly. Typical government and commercial networks are fixed, static, easily located and thus more vulnerable to identification and attack.

APIs are a simple concept: they connect data to create new digital experiences. If we look at the IT modernization trends driving digital transformation, APIs play a critical role in all of them. Cloud projects use APIs. Software that interacts with IoT sensors uses APIs. Contextual mobile apps u...

The agility, scalability, and global footprint of the cloud enables organizations to adopt Microsoft Azure® as the sole route to market for business-critical applications, such as SAP. Although the benefits of Azure and the public cloud are well-known, the challenges of protecting your SAP deploymen...

Companies use artificial intelligence (AI) to make employees more productive and processes more efficient. After all, computers can do simple tasks on a vast scale. This new technology can transform operations, but most enterprises do not know how to put AI theory into a business operation.

Druva enables government agencies to achieve that by helping them safeguard critical information — whether it’s housed at a data center or an endpoint such as a tablet or smartphone — while delivering the convenience and scalability of the cloud.

Neustar, Inc Resources
Web Application Firewalls (WAFs) are growing increasingly popular as IT professionals look to employ another layer of defense to augment their cyber security posture. But buyer beware, not all WAFs capable of equal protection. Here are some key WAF questions - and responses - that you need to know w...