Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Logo-PingIdentity-ForgeRock-Hor-FullColor.png
Ping Identity Webcast

Ping Identity TechNet Cyber Webinar


Event Date: May 31, 2023
Hosted By: Ping Identity & Carahsoft

Identity, Credential, and Access Management (ICAM) is the set of tools, policies, and systems that an agency uses to enable the right individual to access the right resource, at the right time, for the right reason in support of federal business objectives. Ping Identity will provide an overview of how ICAM technology is a core component of the Identity pillar in a zero trust architecture, and how ICAM is a cornerstone for enforcing who/what has access to data and resources and who does not.

In this webinar we discussed:

  • How to centralize ICAM policy and consolidate/reduce identity silos
  • How ICAM technologies work across the Zero Trust Pillars
  • How attribute based access control (ABAC) differs from role based access control (RBAC)
  • Where to deploy course, medium and fine grained ABAC to provide real time decisions and access to resources
  • What is, how to work with, and how to protect cloud technology (hint, it's not just SaaS)
  • How to accomplish the above in disconnected, denied, intermittent, and/or limited bandwidth (DDIL) and hybrid environments

Fill out the form below to view this archived event.


Resources


How_SymantecR_Endpoint_Security_Complete_Helps_Detect_Investigate_and_Respond_to_Advanced_Attacks.jpg
Whitepaper

How Symantec® Endpoint Security Complete Helps Detect, Investigate, and Respond to Advanced Attacks

Today’s environment is difficult for defenders. The threat landscape continues to evolve with expanded threats from the supply chain, more sophisticated phishing, and an ever-expanding set of vulnerabilities. Regardless of the latest methods used by the most advanced attackers, Symantec® Endpoint Security (SES) Complete provides cutting edge technologies so you can know when your organization is under attack, determine the scope of the attack, and contain and eradicate the threat.

In this paper we show a real world attack and how SES Complete blocks most attacks before any damage is done, alerts you to suspicious activities, and gives you the tools to confidently defend your organization.


Fill out the form below to view this Resource.