Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Learn

Events

Archived Events

Logo-redhat-color-375.png
Red Hat Webcast

Event Date: July 15, 2021
Hosted By: Red Hat & Carahsoft
There is no one path or approach to IT modernization; your county, community and agency's priorities shape your strategy.County government IT staff across the United States joined Red Hat online for insights around the efficiency and cost-saving benefits of IT automation and modernization. ...

Liquid-microsite.png
Multi-Vendor Webcast

Event Date: July 15, 2021
Hosted By: Liqid, NVIDIA & Carahsoft
AI-driven research and development applications are testing the limits of traditional, siloed, HPC architectures. Out-dated architectures limit the ability to share valuable accelerator resources such as NVMe, GPUs, FPGAs, and NICs. This significantly diminishes the ability to scale and meet uneven workload ...

Logo-redhat-color-375.png
Red Hat Webcast

Event Date: July 15, 2021
Hosted By: Red Hat & Carahsoft
Red Hat Learning Subscription Premium provides a flexible learning experience and self-paced training options with access to recorded video classes, e-books or live virtual classes.Stream now and learn how a Red Hat Learning Subscription can keep the U.S. Air Force up to speed on new ...

adobe-small-vertical.jpg
Multi-Vendor Virtual Event

Event Date: July 15, 2021
Hosted By: Adobe & Carahsoft
As the pandemic has changed the way the world works and operates day-to-day, so has the way in which we disseminate training materials. A virtual training program must adapt to all aspects of adult learning while maintaining a high level of engagement.

DocuSign-microsite.png
DocuSign Webcast

Event Date: July 15, 2021
Hosted By: DocuSign & Carahsoft
On July 15, 2021, DocuSign hosted their second State of California Virtual User Group focused on one topic, building a Center of Excellence (COE).Attendees heard from Kevin See from the Department of Water Resources (DWR) and Dave Hawley from California Department of Corrections and ...

logo_splunk_1color_K.png
Multi-Vendor Webcast

Event Date: July 15, 2021
Hosted By: Carahsoft, Splunk & Okta
Zero Trust is an evolution of a range of past security architectural approaches and concepts; think network segmentation, least privilege, and defense. The key difference being Zero Trust brings a different mindset to how we design and build security to support the idea of starting with no implicit trust and that we ...

UiPath_2019_Orange_Logo.png
UiPath Webcast

Event Date: July 15, 2021
Hosted By: UiPath & Carahsoft
Do you know how many citizens feel dissatisfied and frustrated after engaging with your customer service center? Are citizens and agency staff waiting long enough to wonder why things take so long? Are your first contact resolution numbers low and do you pay the cost of escalation to Tier II because Tier I is pressured to ...

Sailpoint-microsite.png
SailPoint Technologies Webcast

Event Date: July 15, 2021
Hosted By: SailPoint, UberEther & Carahsoft
Many organizations are rapidly moving to Kubernetes for its proven portability, flexibility, and increased developer productivity. The use of containers allows many organizations and system owners to develop new code and deploy at a fast pace with repeatable and automated processes. However, these benefits present your ...

trend-micro-logo.png
Trend Micro Virtual Event

Event Date: July 15, 2021
Hosted By: Trend Micro & Carahsoft
On July 15, Trend Micro experts shared with webinar attendees how to overcome Zero Trust with Trend Micro. Visibility and analytics are a key part of the DOD Zero Trust Reference Architecture. Avoid cybersecurity risk by increasing visibility and enforcement within your Zero Trust ...

BentleyLOGO_4C_complete_80px.png
Bentley Systems Webcast

Event Date: July 15, 2021
Hosted By: Bentley & Carahsoft
Congressional funding is right around the corner which means project and approval timelines are shrinking, and different project groups are often ...

Resources

Case Study

The Shell International Trading and Shipping Company Limited (STASCO) manages the trading and shipping activities for all of Shell’s products, operating a large fleet of tankers as well as chartering vessels. All ships must comply with rigorous safety standards ensuring they support Shell’s commi...

Rackspace-microsite.png
Rackspace Government Solutions Case Study
Managing one of the largest multicloud public cloud services contracts in state government.

hack.jpg
HackerOne Case Study
Hack the Pentagon was the first bug bounty program in the history of the Federal Government designed to identify and resolve security vulnerabilities within the Defense Department's public-facing websites through crowdsourced security. The results exceeded expectations.

The task of keeping the vast amounts of equipment, including vehicles and weapons, in good working order falls to the USMC’s huge force of “maintainers”. These men and women work to ensure that all equipment when it is called upon is in a safe, reliable and fully operational state of repair. To p...

Deep Instinct worked with the Ponemon Institute to survey over 600 IT and security practitioners about their security stack and their perception of the effectiveness of prevention within the cybersecurity lifecycle.

hackarmy.jpg
HackerOne Case Study
Learn more about the results of Hack the Army 3.0, the third Challenge between DDS and the U.S. Army, and the 11th overall DDS bug bounty Challenge.

"With SailPoint, our IT team is empowered to focus on tackling broader IT strategies and delivering on actionable goals. SailPoint IdentityNow is a critical security solution for us. - Perley Dexter, Director of IT Systems, Norwich University"

iOra’s Geo-Replicator experts provides the bandwidth optimisation that makes the updating of the “Distance Support” portal possible across the entire fleet via satellite. This enables the Navy to run an up-to-date portal on all of its ships, substantially reducing demand on the Navy’s satellite ...

fearhack.jpg
HackerOne Case Study
The U.S. Department of Defense (DoD) invited white hat hackers to find security flaws in systems run by the Pentagon, Air Force, and Army in order to bolster their cyber defenses. Download the case study to learn how the federal government is using this model to fight against cyber attacks.

Scalability, security, and storage – all challenges for today’s education IT leaders. Hear from Cornell University and other academic institutions on how Red Hat’s industry leading enterprise open source technology helped overcome these roadblocks.