Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT)

CTO Sessions: Best Practices for Data in Transit Encryption


Event Date: July 30, 2024
Hosted By: Thales TCT & Carahsoft

High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed.

So, what is the best way to protect network traffic? Encrypt everywhere—between data centers and headquarters to backup and disaster recovery sites, whether on premises or in the cloud.

This webinar covered the best practices for data in transit encryption including how to:

  • Protect against common network threats such as eavesdropping, fiber-tapping, harvest and decrypt
  • Deploy high speed encryption from the core to the cloud to the edge
  • Improve performance
  • Mitigate the quantum threat
  • Address zero trust requirements

Fill out the form below to view this archived event.


Resources


Featured

 Discover how the Axway VA Suite offers a versatile and robust certificate validation solution for both standard and custom desktop and server applications.

Aqua’s Cloud Native Application Protection Platform (CNAPP) protects your cloud native applications with a single, unified solution throughout their entire lifecycle. Unifying key security capabilities, CNAPP can protect against both known and unknown threads using a combination of shift-left ...

In the AI and Machine Learning boom, organizations vie for data and model scalability. Collaboration with third-party organizations (TPOs) is crucial yet hindered by data and model confidentiality concerns. Download this datasheet to learn how Duality’s Secure Collaborative AI solution addresses the...

National security agencies face a tough task in maintaining operational security while analyzing data across domains. Traditional methods involve centralized data collection, which is costly and poses privacy risks. Download this datasheet to learn how Duality Zero Footprint Investigations and Intel...

As data backup appliances near their end of life, their security can substantially weaken, leaving your backups vulnerable. Enhance your data resiliency with Quantum's DXi All-Flash T-Series, providing faster backups and data recovery for more effective data protection.

Discover the power of Zoom Phone, a secure and innovative AI-powered phone system that offers unparalleled flexibility to manage calls from any location and any device. Download our datasheet now to explore how Zoom’s cloud phone system can empower your workforce and boost customer experience!

The Cynerio 360 platform provides device insight, risk analysis, prioritized guidance and industry-focused expertise to implement proactive protections and respond quickly to security incidents. Download the datasheet to learn more.

State and local governments face challenges managing the growing volume and complexity of their data. Cloudera's true hybrid architecture addresses these challenges by enabling agencies to securely manage and analyze data across diverse environments, including public and private clouds. This emp...

In this resource you'll learn how Ingentis org.manager extensions cover every-day as critical HR and organizational development team tasks.

US Government agencies are required by Executive Order EO 14208 and Memorandum M-22-09 to use phishing-resistant authentication for their employees and to offer phishing-resistant authentication to citizens. The Cybersecurity & Infrastructure Security Agency (CISA) “strongly urges system a...