Mission-Ready Analytics: Introducing Lo...
Discover how U.S. public sector agencies can now accelerate their data-driven missions with newly FedRAMP High authorized, Looker (Core). This milestone allows government entities to deploy a powerful, secure and governed business intelligence platform to analyze their most sensitive data on Google Cloud. Join our upcoming webinar to explore how Looker (Core) can help your agency unlock insights with confidence. We'll dive into its powerful Lo...
Smarter Infrastructure Decisions: Balan...
Join HPE and Carahsoft for an in-depth look at how the HPE ProLiant DL145 delivers flexible, cost-effective compute power—whether deployed in the cloud or on-premise. As agencies and enterprises modernize their infrastructure, understanding the trade-offs between cloud and onsite deployment models is critical for performance, compliance and budget optimization. In this session, our experts will walk through:Key capabilities of the HPE Pr...
CimTrak Enabling Comply-2-Connect and C...
As federal agencies accelerate their Zero Trust adoption, ensuring system integrity and compliance with mandates like Zero Trust and Comply-to-Connect (C2C) is more critical than ever. In this webinar, experts from Zscaler and CimTrak will explore how combining Zscaler’s cloud native Zero Trust Exchange with CimTrak’s real-time integrity monitoring and configuration management capabilities create a robust framework for visibility,...
CMMC: How Proofpoint and Microsoft are...
The Cybersecurity Maturity Model Certification (CMMC) is a Department of Defense (DoD) mandate designed to protect sensitive data across its supply chain. More than a regulatory requirement, CMMC demonstrates an organization’s commitment to national security—enhancing resilience, reducing vulnerabilities and supporting the integrity of operations critical to the defense mission. Proofpoint and Microsoft's human-centric approach can...
Zoom Trainings - August 2025
Join us for our 30-minute training sessions in August and receive tailored guidance from Carahsoft’s product specialists to help you master Zoom like a pro. During our Zoom Admin Training, attendees will: Customize user settings and add role assignments. Align their accounts to better support their agency's objectives. Access and interpret usage data for informed decision-making. In our Zoom 101 Training, participants will: Drive eff...
Better Together: Red Hat & GitLab Eleva...
In delivering digital services, public sector organizations must consider an array of factors related to security, compliance and software modernization. Though, with aging infrastructure, limited resources and strict compliance requirements, many organizations struggle to overcome these barriers. Red Hat and GitLab offer a modern, automated DevSecOps solution that streamlines software development, integrates security at every stage and suppor...
TechNet Augusta 2025: Empowering Warfig...
Ivanti and Carahsoft invite you to a post-TechNet Augusta 2025 webinar focused on how emerging technologies are enabling Department of Defense agencies to innovate, adapt, and collaborate in support of their mission objectives. This session is designed for DoD professionals seeking to enhance operational effectiveness at the tactical edge through secure and agile mobility solutions. Discussion topics will include:How robust patch management en...
Live Tech Demo Series
AWS and Carahsoft are offering live, in-depth technical demos every other Wednesday at 2:30pm ET. Our ongoing AWS technical demo series is designed to help you build better business applications in AWS for additional cost savings, performance efficiency, and best practices at scale. Join us for one, or as many 30-minute sessions as you'd like! Discover how your organization can maximize efficiency and innovation with AWS. Register now to learn...
Assume Compromise: Modern Deception Str...
Join us to learn how advanced threats, such as Salt Typhoon, remain undetected for months. Adversaries are leveraging generative AI to mount stealthy attacks that evade traditional security controls. Defenders need an ability to detect threats rapidly and prevent adversary propagation. During this webinar, attendees will learn:How advanced threats are evading detectionWhat the implications are of the assume breach principle of Zero TrustHow mo...
Lessons Learned from Harnessing Healthc...
Join us as we explore real-world examples—like the MGB use case—where generative AI and automation were deployed across departments. We’ll outline the steps successful organizations take before launching LLMs, covering governance, infrastructure readiness and strategies for long-term ROI. During the webinar, attendees will learn how to: Apply insights from real-world healthcare AI deployments Integrate real-time data to suppo...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.