Back to Search Begin New Search Save Search Auto-Notify
Fighting Cyber Threats Among State, Loc...
Government agencies rely on their networks to transfer large amounts of secure data. The network must be protected against well-funded, highly organized, and constant threats from both nation state and criminal elements. Solutions must be scalable to full duplex 10Gbps rates and be cost-effective for network-wide deployment in multiple locations. However, the outdated solutions used by government leave many of these organizations unable to det...
August 14, 2014
Organizer: The FireEye Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Government at the Speed of Business
Discover how Salesforce will help your agency get work done quickly and efficiently, without compromising security. Salesforce's unique platform is able to extend across your entire agency so that employees can interface quicker and keep your data secure while doing so. Join us for this complimentary webcast to hear how to centralize your agency in the cloud securely as we cover: How government agencies are tracking business development opport...
August 14, 2014
Organizer: Salesforce Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
CYBER SHARK EVENT
Join Carahsoft and HP's Government team for a discussion on today's cyber threat landscape and how federal and defense agencies can navigate the sea of "cyber shark" attacks. Guest panelists will share their expertise with us in an open Q&A format on Twitter using hashtag #CyberSharks. Speakers include Dr. Eric Cole, a senior SANS Institute fellow and industry recognized security expert, and former National Reconnaissance Office CIO Jill...
August 12-14, 2014
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
To Build or Not to Build: Private Optic...
Transitioning to a Private Optical Network isn't as daunting as you might think. Optical transmission and packet technologies have matured, and there are now proven methods that minimize inherent risks and drive down costs. In an era of increasing budget constraints and growing demand for huge amounts of network bandwidth, many government agencies are wrestling with the choice of building dedicated, private networks or continuing to buy networ...
August 13, 2014
Organizer: The Ciena Government Team at Carahsoft Technology Corp
Location: Webcast
Add Favorite
IronKey Workspace W700 - A Secure, Wind...
Join Microsoft and IronKey for a complimentary webcast to learn about the IronKey W700 Workspace — the only FIPs certified Windows To Go™ device that provides Windows 8.1. Over the last decade, technological advancements have minimized the need for employees to be as physically present in a traditional office setting. The nature of actual workspaces has shifted away from four walls to the highly mobile, highly connected workplace....
August 13, 2014
Organizer: IronKey by Imation Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Trusted Impersonation: How Digitally Si...
Email is the largest attack vector in cyberspace today. While this is not a revelation, new email-based attack techniques such as Trusted Impersonation, advanced phishing, and hidden malware are on the rise. The widespread adoption of HSPD-12 and increasing use of signed/encrypted emails inside government have inadvertently made email the most damaging, highest value attack vector available. EV*mail is a plug-in for Microsoft Outlook that comb...
August 12, 2014
Organizer: CertiPath Government Team at Carahsoft
Location: Webcast
Add Favorite
Adobe ColdFusion Webcast Series
Secure and Mobilize Your Apps View our Adobe ColdFusion on-demand webcast series to learn how you and your organization can meet the increasing demand for mobile applications, while managing and implementing security within your production environments. Adobe's many features are specifically for HTML5 mobile applications, resulting in simplified end-to-end workflow for mobile application development. Attendees of this webcast learned how ColdF...
August 12, 2014
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
Combatting Advanced Persistent Threats:...
Enterprises are constantly centralizing incident-response teams to detect and respond to Advanced Persistent Threats (APTs). As customers implement Standard Occupational Classification System (SOCs), a framework is required to seamlessly orchestrate and automate the multiple roles, processes, and technologies to keep up with APT’s and other threats in a highly cost efficient and effective manner. View our on-demand webcast to learn how R...
August 12, 2014
Organizer: RSA Government Team at Carahsoft
Location: Webcast
Add Favorite
Virtual Collaboration Boot Camp: A DCO...
Join Adobe, milSuite, and Carahsoft for a 6-part webinar series to bring your organization up to speed with the most secure online collaboration tools. Whether you are new to Defense Connect Online (DCO) and milSuite or looking for some helpful tips and tricks, this series has something for everyone. A team of DCO and milSuite specialists will be conducting 3 DCO webinars and 3 milSuite webinars over the course of 3 days starting Tuesday, Augu...
August 7, 2014
Organizer: Adobe Government at Carahsoft
Location: Webcast
Add Favorite
Virtual Collaboration Boot Camp: A DCO...
Join Adobe, milSuite, and Carahsoft for a 6-part webinar series to bring your organization up to speed with the most secure online collaboration tools. Whether you are new to Defense Connect Online (DCO) and milSuite or looking for some helpful tips and tricks, this series has something for everyone. A team of DCO and milSuite specialists will be conducting 3 DCO webinars and 3 milSuite webinars over the course of 3 days starting Tuesday, Augu...
August 7, 2014
Organizer: Adobe Government at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search