Catch up on the latest news from Carahsoft and our partner ecosystem.

News

From The Trusted IT Solutions Provider™ & Our Partners

Carahsoft Technology Corp., Carahsoft Technology Corp., the trusted government IT solutions provider, today announced that it will proactively market and sell Dell EMC VxBlock Systems through its reseller partner ecosystem to the public sector market.


DATUM, the leading provider of data governance and stewardship software, and Carahsoft Technology Corp., the trusted government IT solutions provider, today announced a partnership. Under the agreement, Carahsoft will be a premier reseller of DATUM's industry-leading Information Value Management® solution via Carahsoft's GSA schedule and Carahsoft's NASA Solutions for Enterprise-Wide Procurement (SEWP) contract.

Carahsoft Technology Corp., the trusted government IT solutions provider, is proud to host the seventh annual Citizen Engagement Seminar. This one-day event will discuss how agencies are utilizing technology, communication channels, online portals and social media to bridge the gap between agency missions and today’s expectation of citizen service, information delivery and public involvement.


CloudPassage, the leading cloud infrastructure security provider, today announced a partnership with Carahsoft Technology Corp., the trusted government IT solutions provider. Under the agreement, Carahsoft will serve as CloudPassage’s master government aggregator, offering the company’s FedRAMP-Ready and on-demand server and workload security solution to the public sector via Carahsoft’s GSA schedule and NASA SEWP contracts.


SW_logo_black.png

May 12, 2017

For a cybersecurity expert, the Oxford Dictionary definition of cyberthreat is a little lacking: "the possibility of a malicious attempt to damage or disrupt a computer network or system." This definition is incomplete without including the attempt to access files and infiltrate or steal data.

In this definition, the threat is defined as a possibility. However, in the cybersecurity community, the threat is more closely identified with the actor or adversary attempting to gain access to a system. Or a threat might be identified by the ...