Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Nutanix-Logo-microsite.png
Nutanix

Leveraging Nutanix with Citrix


Event Date: April 28, 2022
Hosted By: Nutanix & Carahsoft

As a Nutanix partner, are you looking to provide your customers with secure, on-demand, and elastic access to virtual applications, desktops, and data for remote workforces?

Meet Nutanix and Citrix in their new partnership designed to deliver the highest-quality hyperconverged infrastructure on the market.

In this webinar, attendees learned how Nutanix and Citrix have partnered to bring customers:

  • Citrix Virtual Applications and Desktops on Nutanix Clusters – Utilize a single management console to reduce the operational complexity of migrating or extending your applications and data between clouds

  • Co-Developed Plugin Architecture for Seamless Integrations – Enjoy 1-click mobility to access all of Citrix’s solution offerings, including Citrix Studio, Citrix Director, and Citrix Cloud

  • 164% ROI in Less Than 6 Months – Save thousands of hours with increased operational simplicity and a 90% faster deployment time


Fill out the form below to view this archived event.


Resources


DataLocker eBook – What is CMMC 2.0?
eBook

DataLocker eBook – What is CMMC 2.0?

Established by the United States Department of Defense (DOD), the Cybersecurity Maturity Model Certification (CMMC) is a framework designed to fortify the cyber defenses of government contractors. The program aims to safeguard confidential information within the DOD supply chain by requiring comprehensive third-party assessments of the security practices of both contractors and subcontractors alike. In essence, CMMC outlines the specific IT security standards businesses must satisfy in order to secure lucrative government contracts. CMMC was introduced in response to a string of security breaches targeting sensitive federal data. The high-profile nature of those exploits led the DOD to reexamine the security capabilities of its ecosystem. The agency determined that the insufficiency of current standards, combined with the lack of accountability from resource-strapped subcontractors rendered the supply chain extremely vulnerable to cyber threats.


Fill out the form below to view this Resource.