Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

palo-alto-networks-microsite-01.png
Palo Alto Networks

Securing the IoT Frontier: Palo Alto Networks Solutions for Unmanaged Devices


Event Date: March 04, 2025
Hosted By: Palo Alto Networks & Carahsoft

Attendees joined us for an IoT security webinar on Tuesday, March 4th, and learned how to achieve comprehensive Zero Trust security for their IoT devices with Palo Alto Networks Next-Generation Firewalls.

Our Palo Alto Networks IoT specialists, Anurag Thantharate, PhD, and Karthik Thumula, showed how their Next-Generation Firewall solutions can help stay ahead of complex threats with ML-powered, cloud-based network security.

Discussion topics included:

  • Enhancing device visibility with real-time monitoring

  • Enabling automated discovery and response with advanced risk assessment

  • Enforcing robust security policies across your ecosystem

  • Maximizing security and minimizing downtime


Fill out the form below to view this archived event.


Resources


Featured

 Discover how the Axway VA Suite offers a versatile and robust certificate validation solution for both standard and custom desktop and server applications.

Aqua’s Cloud Native Application Protection Platform (CNAPP) protects your cloud native applications with a single, unified solution throughout their entire lifecycle. Unifying key security capabilities, CNAPP can protect against both known and unknown threads using a combination of shift-left ...

In the AI and Machine Learning boom, organizations vie for data and model scalability. Collaboration with third-party organizations (TPOs) is crucial yet hindered by data and model confidentiality concerns. Download this datasheet to learn how Duality’s Secure Collaborative AI solution addresses the...

National security agencies face a tough task in maintaining operational security while analyzing data across domains. Traditional methods involve centralized data collection, which is costly and poses privacy risks. Download this datasheet to learn how Duality Zero Footprint Investigations and Intel...

As data backup appliances near their end of life, their security can substantially weaken, leaving your backups vulnerable. Enhance your data resiliency with Quantum's DXi All-Flash T-Series, providing faster backups and data recovery for more effective data protection.

Discover the power of Zoom Phone, a secure and innovative AI-powered phone system that offers unparalleled flexibility to manage calls from any location and any device. Download our datasheet now to explore how Zoom’s cloud phone system can empower your workforce and boost customer experience!

The Cynerio 360 platform provides device insight, risk analysis, prioritized guidance and industry-focused expertise to implement proactive protections and respond quickly to security incidents. Download the datasheet to learn more.

State and local governments face challenges managing the growing volume and complexity of their data. Cloudera's true hybrid architecture addresses these challenges by enabling agencies to securely manage and analyze data across diverse environments, including public and private clouds. This emp...

In this resource you'll learn how Ingentis org.manager extensions cover every-day as critical HR and organizational development team tasks.

US Government agencies are required by Executive Order EO 14208 and Memorandum M-22-09 to use phishing-resistant authentication for their employees and to offer phishing-resistant authentication to citizens. The Cybersecurity & Infrastructure Security Agency (CISA) “strongly urges system a...