Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources


Upcoming Events

Trend Micro Webcast

Event Date: June 06, 2023
Hosted By: Trend Micro & Carahsoft
As skilled cyber labor resources become scarce, and target attack surfaces increase, XDR technology provides the ability to correlate email, endpoint, server, cloud, workload, and network sources for stronger detection and greater insight. A roadmap to consolidating siloed point solutions provides alert prioritization, ...

RegScale Webcast

Event Date: June 06, 2023
Hosted By: RegScale & Carahsoft

AvePoint Public Sector Training

Event Date: June 06, 2023
Hosted By: AvePoint
Location: Austin, TX
Ensure your agency can Collaborate with Confidence in Microsoft 365 and the Power Platform.

Multi-Vendor Event

Event Date: June 06, 2023
Hosted By: MongoDB, HashiCorp, AWS & Carahsoft
Location: Arlington, VA
Join MongoDB, HashiCorp and AWS at Distilling Government Innovation on June 6th in Arlington, VA. ...

Multi-Vendor Webcast

Event Date: June 06, 2023
Hosted By: Dynatrace, Red Hat & Carahsoft
Red Hat and Dynatrace can help your agency manage the complex GSA IT environments with enterprise-wide visibility and navigate through a smarter hybrid cloud experience.  ...

Arista Networks Event

Event Date: June 07, 2023
Hosted By: Arista & Carahsoft
You're invited to join Arista Networks and Carahsoft for an IPv6 (Internet Protocol version 6) thought leadership ...

VMware Event

Event Date: June 07, 2023
Hosted By: VMware, Sterling & Carahsoft
Location: Bremerton, WA
As teams lean more on products to help streamline their infrastructure requests and changes, VMware takes the request to "do more with less" and provides the tools to transition into a highly automated and modern infrastructure. ...

Multi-Vendor Event

Event Date: June 07, 2023
Hosted By: Elastic, HashiCorp & Carahsoft
Current software development and delivery processes are being challenged by the speed of technological change and the use of legacy applications, preventing the rapid deployment of mission-critical software capabilities. ...

Ivanti Forms

Event Date: March 09, 2023 - July 06, 2023
Hosted By: Ivanti & Carahsoft

Invicti Event

Event Date: June 08, 2023
Hosted By: Invicti & Carahsoft
Location: Reston, VA



Traditional endpoint protection leaves gaps as it tries to address modern threats. FireEye Endpoint Security improves security visibility and the quality and relevance of your threat data.

Organizations worldwide are expanding their cloud and virtualization initiatives beyond traditional data center and public cloud deployments. New initiatives include security as an NFV component or as a more complete multi-tenancy solution. The VM-Series supports the same next-generation firewall an...

Now more than ever, enhanced data security is a necessity for government agencies and contractors. As such, we need to go beyond safeguarding systems—security must start at the drive level. Seagate® TAA and FIPS-compliant hard drives and SSDs answer this need, addressing every step of the supply cha...

FidelisDetect Insider Threat Data Exfiltration Assessment. Do you know what's leaving your network?

Product Brief
When emergencies strike, AtHoc provides a seamless and trusted exchange of critical information between organizations, their people, devices, and any external entity. That’s essential, as no event occurs in isolation. We call that networked crisis communication, a field AtHoc pioneered and is rec...

Learn how HyTrust balances the clash of missions between security and IT Ops teams with automation in this article.

Palo Alto Networks(r) Security Operating Platform prevents successful cyberattacks by harnessing analytics to automate routine tasks and enforcement. Tight integration across the platform, and with partners, simplifies security so you can secure users, applications and data.

In this M-Trends 2018 report, we look at some of the latest trends identified during the October 1, 2016 to September 30, 2017 reporting period, as revealed through incident response investigations by Mandiant, a FireEye company.

Check out this solution guide to learn how machine data can help find anomalies and fight fraud!

Much of cybersecurity is focused on protecting users’ identities and personal information. This approach has numerous benefits, not just for the individual users but for the systems with which they interact – it protects people from malicious activities such as identity theft, while it also cuts dow...