Back to Search Begin New Search Save Search Auto-Notify
Identify Nefarious Actors and Prevent D...
You are invited to join SailPoint and Splunk for a live webinar on Tuesday, February 18th to learn about the challenges and impact of Insider Threat and how Identity and Access Governance, Privileged User Management, and User Behavior Analytics are critical in protecting high value assets from nefarious actors. When properly implemented modern identity governance and administration, identity audit, behavior monitoring, and analytics provide vi...
Add Favorite
Splunk Enterprise Security for the Army
Splunk Enterprise Security (ES) is the nerve center of the security ecosystem, giving teams the insight to quickly detect and respond to internal and external attacks, and simplify threat management minimizing risk. Splunk ES helps teams gain organization-wide visibility and security intelligence for continuous monitoring, incident response, SOC operations, and providing executives a window into business risk.Join Splunk and Carahsoft for a pr...
Add Favorite
The Future of Encrypting Network Data
High-speed data networks are not inherently secure. Public and private network infrastructure are exposed to a multitude of cyber-threats, and with the rapid growth of IoT, Virtualization, Big Data Applications, Cloud, and Data Centric Services, the need for high data volume (100Gbps+ links) networks to securely deliver information when and where we need it has increased. Thales Trusted Cyber Technologies, offers a network security solution th...
Add Favorite
Adobe Digital Learning Seminar in McLean, VA
Every day departments undertake the challenge of training their workforce and with all the resources put into training, it's important they are leveraged efficiently and effectively. More and more government clients are turning to learning & development of personnel as their force multiplier. Department of Defense is prioritizing funding to programs like Navy Education for Sea Power, Army Talent Management, and Air Force Learning Continuum...
Add Favorite
Keeper Defending U.S. Government Agencies
Cybersecurity starts with password security. 81% of all data breaches are due to weak password security. How can we prevent these breaches while quickly and cost-effectively closing the largest security gap in government agencies? The answer is with strong password policies, enforced by an easy-to-use, intuitive password security solution. Join Keeper for a webinar on March 24th to learn how to best protect your agency. During this webinar, Da...
Add Favorite
Securing Splunk: Balancing Big Data Ben...
Federal agencies require a simple way to correlate all security-relevant data so they can manage their security posture. Instead of merely watching events after they occur, agencies should anticipate their occurrence and implement measures to limit vulnerabilities in real time. For that, agencies need an analytics-driven SIEM platform such as Splunk. However, once data is correlated by SEIM tools, it becomes extremely valuable. By integrating...
Add Favorite
Identity 3.0 for the Department of Ener...
The Department of Energy has spent years deploying legacy Identity Management (IDM) solutions and Privileged Access Management (PAM) solutions - many having spent millions on deployment, infrastructure, maintenance, and staffing. Little value gained in return - countless hours of effort focused on a handful of systems, directories, or databases with no significant improvement to compliance and security. As agencies move toward digitally transf...
Add Favorite
Splunk ESI Contract and NAVSEA
NAVSEA has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DOD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to NAVSEAHow to leverage the contractDon't miss out. R...
Add Favorite
Google Cloud 2020 Webinar Series: Moder...
Join Google Cloud and Carahsoft to learn how you can modernize your legacy applications into microservices. We will start off by showing you some patterns for breaking a monolith into microservices. We will demonstrate how to use Cloud Run to quickly deploy stateless, serverless workloads. Finally, we will show you how you can use Istio to secure and monitor your deployed microservices. This on-demand webinar will cover: Patterns for creating...
Add Favorite
Build a Strong Insider Threat Detection...
Insider threats are still a growing problem, despite increasing mindshare and budgets. The key to stopping these threats - and to strengthening the organization as a whole - is making data-driven decisions using visibility into data, machines, applications, and people. In this webcast, presented by Dtex Systems and Carahsoft, Dtex will share how they are helping to utilize data to build stronger business and security strategies. We will discus...
Add Favorite
Back to Search Begin New Search