Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

safelogic-microsite-logo.png
SafeLogic

Transitioning from FIPS 140-2 to 140-3: What Technology Providers Need to Know


Event Date: April 24, 2025
Hosted By: SafeLogic & Carahsoft

NIST FIPS 140, Security Requirements for Cryptographic Modules, applies to technology products performing data encryption that the federal government purchases. Technology providers must obtain FIPS 140 certification that the cryptography in their products has been tested and approved for government use. As the U.S. federal government moves from FIPS 140-2 to FIPS 140-3, these providers must navigate evolving cryptographic validation requirements to maintain compliance and maintain eligibility for federal contracts.

This webinar provided a concise, actionable roadmap for software, hardware and cybersecurity vendors who must update their encryption modules to meet the new standards.

Topics covered included:

  • Key Differences Between FIPS 140-2 and 140-3 – Understanding the new validation criteria and security enhancements
  • Compliance Timelines & Risks – Why failing to transition could mean losing eligibility for federal procurements
  • Strategic Approaches to Migration – Best practices for testing, revalidation, and maintaining certification
  • Common Pitfalls & How to Avoid Them – Lessons learned from organizations undergoing this transition

Attendees joined us for a deep dive into the FIPS 140-3 transition and to ensure that their encryption solutions will remain viable in the federal market.

Resources


Featured

CipherDriveOne datasheet describing how the cutting-edge solutions, CipherDriveOne provides a unified solution allows government customers the ability to store top-secret data.

Explore how government agencies can modernize service delivery through automation, AI, and streamlined workflows. Unlock key benefits such as improved citizen engagement, faster response times, and enhanced operational efficiency. Download this resource to learn how ServiceNow empowers public sector...

CipherDriveOne datasheet describing how a unified encryption suit can safeguard your sensitive information with ease as a pre-boot Authorization Acquisition (AA) host Software that manages a hardware Encryption Engine (EE).

Learn how DAE for SAP can help your organization secure sensitive data, streamline compliance, and improve operational efficiency, read the full datasheet.

This Dell Technologies resource outlines their approach to delivering comprehensive solutions tailored to customer outcomes, particularly in the federal and defense sectors. It emphasizes the integration of cutting-edge technologies and partnerships to address evolving challenges like security, digi...

Automate Threat Advisories and Post-hoc Detection for Cyber Rapid Response.

SBOM Manager
Datasheet
Stay compliant with regulations and ahead of industry trends by gaining immediate insights into your SBOM portfolio. Empower your team to ingest, generate, store, manage, monitor and distribute SBOMs for the software you build, OSS you use, and 3rd party vendor applications—all in one place with Son...

Achieve Complete Visibility, Behavior Analytics and Real-Time Reports for Your Zscaler Log Data.

SentryCard is created for organizations that need absolute certainty about who is entering their facilities, accessing their devices, or logging into their websites.

When the U.S. Army looked into technology that could spot funds with the potential to be lost due to expiring contracts, it tapped AI to find contracts with unused funds, empowering contracting officers to reclaim the money and reallocate it to other vital areas—boosting the deobligation rate ...