Event Date: October 24, 2017 at 12:00 PM ET Hosted By: Okta, Skyhigh Networks & GuidePoint Security Location: Philadelphia, PA
The adoption of cloud and mobile technologies has changed the threat landscape for IT and security professionals. While agility and scalability will benefit your organization, you will be faced with the challenge of managing identities and maintaining compliance as your data moves to the cloud. Are you ...
Event Date: October 24, 2017 at 2:00 PM ET Hosted By: Lookout & Carahsoft
Join Lookout and Carahsoft for a live webcast to learned the latest insights into mobile threats affecting the government, including how to protect yourself from:Network-based risksApplication-based risksDevice-based risksLookout will demonstrate their Mobile Endpoint Security, ...
Event Date: October 25, 2017 at 3:00 PM ET Hosted By: F5 Networks, ClearShark & Carahsoft Location: Norfolk, VA
Join F5 Networks, Splunk, and ClearShark for a complimentary TechTalk on the integration capability between F5’s BIG-IP appliances and Splunk’s Big Data analytics software via the “F5 Networks – Analytics App” on Splunk. The “F5 Networks – Analytics ...
Event Date: October 26, 2017 at 10:45 AM CT Hosted By: Okta, Zscaler, Alchemy Tech Group & Carahsoft Location: Baton Rouge, LA
The rapid adoption of cloud applications is modernizing the world of IT. These on-demand services provide tremendous ROI, but also introduce new identity challenges that must be overcome to tap into their potential.Join us on October 26th for a Cloud ...
Event Date: October 26, 2017 at 2:00 PM ET Hosted By: Carahsoft & ID.me
The Equifax breach exposed names, dates of birth, and social security numbers of 140 million Americans, compromising all services that relied on that information to protect high-value services online. Government services are particularly vulnerable — according to the Federal Trade Commission, 49% ...
Event Date: October 31, 2017 at 2:30 PM PT Hosted By: F5 Networks & Carahsoft Location: Honolulu, HI
Are your network administrators using strong authentication? The DoD Cybersecurity Discipline Implementation Plan's top priority line of effort is Strong Authentication for Privileged Users.Join F5 Networks for a complimentary TechTalk at TechNet Asia Pacific where ...
Event Date: November 01, 2017 at 6:45 PM PT Hosted By: F5 Networks & Carahsoft Location: Honolulu, HI
It’s not always just bigger, better and faster…that would not be the F5 way. With the release of the new iSeries appliances, F5 has developed hardware that will adapt to your specific workloads and give you the greatest flexibility in using F5’s Traffic Management Operating System (TMOS) to secure your ...
Event Date: November 02, 2017 at 11:00 AM ET Hosted By: InQuisient & Carahsoft Location: McLean, VA
Please join InQuisient for lunch on November 2nd, meet our CEO, Scott Dixon Smith, and learn how the InQuisient software platform can help you bring order to your current enterprise data management challenges. InQuisient’s suite of tools helps government enterprises manage billions of dollars ...
Event Date: November 02, 2017 at 2:00 PM ET Hosted By: Carahsoft
When solving a difficult problem collaboration is key, yet it’s not always easy. For Application Developers, DevOps, and IT Operations teams this is an increasing challenge whether it's troubleshooting and monitoring together, or solving issues with fewer clicks and less time all so they can ultimately ...
Event Date: October 17, 2017 Hosted By: VMware & Carahsoft Location: Chicago, IL
Thanks for your interest in VMware Chicago Day. Attendees learned about the following: Workspace ONE - VMware's end user computing and mobility management solutionvCloud Air and integration with Amazon AWSSoftware-defined storage and hyper ...
Event Date: October 17, 2017 Hosted By: Proofpoint & Carahsoft
During this webinar, attendees reviewed how to: Keep pace with dynamic threat landscape using continuously updated intelligenceBlock attacks and campaigns before they reached their organizationIncrease the dependability of their existing security ...
Event Date: October 17, 2017 Hosted By: F5 Networks & Carahsoft Location: Washington, DC
Attendees of the 3rd part of the series joined F5 Networks and Carahsoft for a discussion on migrating workloads to the Cloud; how F5 can provide a consistent and repeatable method for setting up application services, bridge technology for hybrid data centers, security in the cloud, certified and validated vendor ...
Event Date: October 11, 2017 Hosted By: VMware & Carahsoft
Attendees of this webcast learned how NSX can:Provide granular security delivered to the individual workload through micro-segmentationReduce network provisioning time from days to secondsImprove operational efficiency through automationIncrease workload mobility independent of ...
Event Date: October 11, 2017 Hosted By: FireEye & Carahsoft
Cyber attackers continue to evolve, improving their tactics, techniques, and procedures faster than security teams can keep up. Increasingly organized and collaborative, their methods grow more sophisticated each year - and 2016 was no exception. Download this archived ...
Event Date: October 05, 2017 Hosted By: VMware & Carahsoft Location: Sacramento, CA
Thanks for your interest in the VMware Sacramento Day!Attendees of this event learned about the following:Insights into VMware best practices, planning, and strategiesEnablement and training on VMware's emerging technologiesSoftware defined enterprise principles ...
Event Date: October 05, 2017 Hosted By: SAP NS2 & Carahsoft
This webcast featured Mr. Alan Wade, former CIO of the Central Intelligence Agency, Raj Dodhiawala, Chief Product Officer of CounterTack, and Bob Palmer, Vice President of Solutions and Innovation at SAP National Security ...
Event Date: September 21, 2017 Hosted By: VMware & Carahsoft
During this webcast, speaker Carlos Phoenix, Global Cyber Strategist at VMware, discussed:Data protecting challenges faced by universities Compliance requirements being requested by the community, and how VMware can respond to these challenges
Event Date: September 21, 2017 Hosted By: Lookout & Carahsoft
Attendees of this webcast learned the latest insights into mobile threats affecting the government, including how to protect yourself from:Network-based risksApplication-based risksDevice-based risksLookout demonstrated their Mobile Endpoint Security, ...
NetAbstraction provides secure, varied, and non-apparent network connectivity, a range of identity
management and persona attribution options to alter or reduce the cyber attack profile; support for
migration on customer activities to the cloud; and system designs to help control customer
F5 and Amazon Web Services (AWS) have partnered to help you rapidly deploy application workloads without incurring the capital expenditures of new infrastructure. AWS is both a pioneer and leader in the public cloud marketplace, providing customers with the ability to provision and deploy applicatio...
ThreatStream provides the essential analysis and correlation that you need to translate raw, unstructured and duplicative data into true intelligence. Reduce the noise of false positives from outdated irrelevant data in minutes. What’s left is true insight in the form of pre-built rules, reports, ...
I didn't know it at the time but my introduction to the security specialty of incident response occurred when I first read the book The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, by Clifford Stoll. The book goes into great detail of how Stoll combined his general curio...
The Center for Protection of the National Infrastructure (CPNI) and CERT-UK recently sponsored a white paper called Threat Intelligence: Collecting, Analyzing, Evaluating. The paper discusses the need for ensuring that intelligence collected be relevant for major security stakeholders in your organi...
IT security teams within federal government agencies and their contractors face a daunting series of challenges in securing their networks against modern malware intrusions, including advanced persistent threats (APTs), advanced targeted attacks (ATAs), polymorphic malware, and file-less intrusions....
Perimeter defenses are inadequate protection against today's advanced threats. Traditional signature-based approaches leave a gap as attackers continuously use new, hard-to-detect methods to compromise hosts, establish a hidden presence on target systems, and exfiltrate sensitive data out of organiz...
From the data center to the point of care, VMware
accelerates digital transformation so healthcare organizations can dedicate
fewer resources to maintaining legacy apps and more to continuously improving
patient care. At the heart of the transformation is the Software-Defined Data
VMware NSX enables the segmentation of a network down to the individual VM level, a concept known as micro-segmentation. By applying security policies to individual VMs, NSX reduces east-west traffic within the data center and prevents attackers from moving laterally in search of information.