Event Date: February 28, 2017 at 2:00 PM EST Hosted By: F5 Networks & Carahsoft
Join F5 Networks and Carahsoft for an overview of the latest high performance hardware platform from F5, the iSeries. This webcast is designed to help you understand how you can use the latest features from F5 to automate ...
Event Date: March 08, 2017 at 2:00 PM EST Hosted By: RSA & Carahsoft
Strong identity assurance rests on more than just strong authentication, it requires a context-based approach that links authentication and access policy to determine the appropriate level of authentication, while minimizing the impact on the end-user experience.
Event Date: March 14, 2017 at 2:00 PM EST Hosted By: Insight Engines & Carahsoft
What if everyone could quickly investigate voluminous data sets via Splunk using simple natural language queries? Productivity and accessibility would increase, your hiring pool would expand, and onboarding of new hires would take days rather than weeks. Imagine a future where, instead of ...
Event Date: March 14, 2017 at 2:00 PM EST Hosted By: Symantec & Carahsoft
Symantec Endpoint Protection (SEP) 14 is a game changing integrated security platform incorporating nine next generation technologies and cloud intelligence to deliver a truly superior endpoint protection platform bringing a level of power, protection, and performance together that's unmatched in the market today. When ...
NetAbstraction provides secure, varied, and non-apparent network connectivity, a range of identity
management and persona attribution options to alter or reduce the cyber attack profile; support for
migration on customer activities to the cloud; and system designs to help control customer
F5 and Amazon Web Services (AWS) have partnered to help you rapidly deploy application workloads without incurring the capital expenditures of new infrastructure. AWS is both a pioneer and leader in the public cloud marketplace, providing customers with the ability to provision and deploy applicatio...
I didn't know it at the time but my introduction to the security specialty of incident response occurred when I first read the book The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, by Clifford Stoll. The book goes into great detail of how Stoll combined his general curio...
The Center for Protection of the National Infrastructure (CPNI) and CERT-UK recently sponsored a white paper called Threat Intelligence: Collecting, Analyzing, Evaluating. The paper discusses the need for ensuring that intelligence collected be relevant for major security stakeholders in your organi...
Perimeter defenses are inadequate protection against today's advanced threats. Traditional signature-based approaches leave a gap as attackers continuously use new, hard-to-detect methods to compromise hosts, establish a hidden presence on target systems, and exfiltrate sensitive data out of organiz...
Today’s evolving threat landscape makes it difficult for government agencies to
adequately detect and respond to increasingly sophisticated attacks. Perhaps the single
most challenging threat facing the United States government is the insider threat. Though
they occur with less frequency than t...
The Certes Enforcement Point (CEP) Variable Speed Encryptors (VSEs) are bandwidth customizable multi-layer encryption appliances that provide tunnel-less data protection, including Ethernet frame encryption for Layer 2 networks, IP packet encryption for Layer 3 networks, and Layer 4 data payload enc...
Achieving the right balance of security – without compromising the user experience – is a challenge for many federal agencies. RSA® Adaptive Authentication solves this challenge by providing risk-based multi-factor authentication for government agencies, ensuring the integrity of every user log...