Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Learn

Events

Upcoming Events

Google_Cloud-_Color_with_Cloud_icon.png
Google Virtual Event

Event Date: March 09, 2021
Hosted By: Google Cloud, Looker & Carahsoft
During this roundtable, we will feature demos, government use cases, and a live Q&A. This session will cover the following topics:Google Workspace: About Google Workspace for Government and Remote Work AdoptionCurrent incentives and offersHow to use Workspace with ...

adobe-small-vertical.jpg
Adobe Webcast

Event Date: March 09, 2021 - March 18, 2021
Hosted By: Adobe
Recent events have caused government agencies to dramatically speed up their move to e-signatures & digital workflows to ...

NS2-full-logo_2.png
SAP NS2 Virtual Event

Event Date: March 10, 2021
Hosted By: Public Sector 360 & SAP NS2
Registration is now open for our Defense Readiness Workshop! Join government leaders as they explore DOD's modernization and transformation initiatives. Attendees can expect to learn how the DOD delivers the speed, insight, and security the National Defense Strategy demands, and what it means for warfighters and the ...

Bravium_Official_80px.png
Bravium Webcast

Event Date: March 10, 2021
Hosted By: Bravium & Carahsoft
The importance of IT security has never been a secret, but its value could not be any clearer today. Given the recent discoveries of the Federal Government and the IT vulnerabilities exposed by foreign actors, the time to focus on IT security is now. Join Bravium and Carahsoft for a webinar discussing the leading tool for ...

Collibra-microsite.png
Collibra Webcast

Event Date: March 10, 2021
Hosted By: Collibra & Carahsoft
CPE credit available
As the federal government transitions to a new administration and new priorities, one initiative that is expected to remain is the Federal Data Strategy. Data governance and data intelligence ...

adobe-small-vertical.jpg
Adobe Webcast

Event Date: March 11, 2021 - March 16, 2021
Hosted By: Adobe
Recent events have caused government agencies to dramatically speed up their move to e-signatures & digital workflows to replace in-person interactions.

SAP_NEW_SAP_LOGO.png
SAP Webcast

Event Date: March 11, 2021
Hosted By: 360Suite, cBEYONData, SAP, Carahsoft
New year, new upgrade? SAP BusinessObjects BI 4.3 is here with great new features and enhancements that you wouldn't want to miss! SAP, 360Suite, cBEYONData, and Carahsoft are joining forces in this 

Precisely_wordmark_rgb_purple-1.png
Precisely Webcast

Event Date: March 11, 2021
Hosted By: Precisely & Carahsoft
IBM Z platform and IBM i systems play an essential role in ensuring government and public sector agencies have the data required to meet their missions and effectively serve citizens. IT modernization projects are designed to improve service delivery using ServiceNow suffer due to lack of visibility into these critical ...

logo_splunk_1color_K.JPG
Splunk Webcast

Event Date: March 11, 2021
Hosted By: Splunk & Carahsoft
CPE credit available
Join us for our Splunk 101 webinar with the US Military Academy. Whether the mission is to educate, train, and inspire or to keep the country safe, government agencies rely on a ...

Qlarion-microsite.jpg
Qlarion Webcast

Event Date: March 11, 2021
Hosted By: Qlarion & Carahsoft
CPE credit available
Jumpstart your cross-agency data sharing program with Adam Roy, the CTO of Qlarion. Drawing from Qlarion’s experience standing up award-winning data analytics frameworks for state and local government, he will explore best practices for fast tracking data sharing across your organization and creating a secure, scalable ...

Resources

Featured

Federal agencies are embracing the cloud more than ever - not only because of Cloud First and other IT-related mandates, but because of the tangible benefits. Read more in this eBook from HyTrust and FCW.

For state and local agencies, complying with the vast array of government and industry standards is business as usual. Learn how to keep on top of everything with this eBook from HyTrust and GCN.

Seagate_Government_Logo-2color-horizontal.png
Seagate Government Solutions Infographic
When you have to be sure every bit is encrypted, software alone is not enough. Seagate offers two levels of hardware-based encryption—Essential and Certified—to help protect the entire lifecycle of data security for business, government, and enterprise.

With the ever-increasing volume and publicity of cybersecurity threats, security teams struggle to improve the security posture of their infrastructure and stay up-to-date and in compliance with continuously evolving regulatory requirements. According to ESG research, the most important IT meta-tren...

Seagate_Government_Logo-2color-horizontal.png
Seagate Government Solutions Resources
In today’s business environment, data creates value–so it’s more important than ever to protect it as a vital business asset.

Network Operations Management is a single platform for network configuration and status.Network engineering and operations teams face a complex, moving target. But unfortunately, they're typically armed with only a disparate collection of management tools-with little or no integration. Network teams...

Software is eating the World. We are becoming more and more reliant on IT services to run our lives. With this reliance comes the expectation that IT services will just work, because if they don't, customers will move to another provider. Find out how SAP's Application Life-cycle Management best pra...

tableau_logo_updated.png
Tableau Resources
Keep up with the latest features of Tableau - whether it's Tableau Desktop, Server, Online, or Mobile, it can all be found here!

asg-microsite.png
ASG Technologies Video
In 2016, IBM announced their partnership with UNICOM for future development of Content Manager OnDemand (CMOD). While IBM maintains that nothing has changed from a business perspective, they have significantly reduced the CMOD sales team and are no longer handling support. Therefore, it appears to t...

With the rising value and volume of digital assets, there’s greater risk of Insiders leaking or stealing sensitive data. Once you grant insiders access to your network, perimeter security offers no protection. Guarding against insider threats requires a focus on understanding and securing the data...