Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

Logo-redhat-color-375.png
Red Hat Event

Event Date: September 03, 2024 - September 06, 2024
Location: Washington, DC
Red Hat will be attending Billington CyberSecurity Summit from Tuesday, September 3 to Friday, September 6, 2024 in Washington, DC. Join over 2500 attendees and 200+ top speakers participating in more than 40 sessions and breakouts at the 15th Annual Billington CyberSecurity Summit, the leading ...
proofpoint_logo.png
Proofpoint Webcast

Event Date: September 03, 2024
Hosted By: Proofpoint & Carahsoft
In today’s landscape of increasingly sophisticated cyber threats, safeguarding state, local and national security is more crucial than ever. Proofpoint and Carahsoft are thrilled to invite you to our upcoming webinar. We’ll explore how the Cybersecurity Maturity Model Certification (CMMC) can ...
Nutanix-Logo-microsite.png
Nutanix Webcast

Event Date: September 06, 2023 - September 04, 2024
Hosted By: Nutanix & Carahsoft
For Virtual and Datacenter Administrators Cybersecurity threats are continuing to increase and getting more advanced. The evolving nature of technology constantly challenges organizations to adapt their cybersecurity measures to defend against these persistent threats. Nutanix Flow is a ...
New-Hitachi-Vantara-Logo80px.png
Hitachi Vantara Webcast

Event Date: September 04, 2024
Hosted By: Hitachi Vantara Federal, Commvault & Carahsoft
This webinar is designed for federal IT professionals seeking to move beyond conventional backup solutions and adopt comprehensive cyber resilience frameworks. Our experts will cover topics such as ...
Fortinet_Logo_Black-Red.png
Fortinet Webcast

Event Date: September 04, 2024
Hosted By: Fortinet & Carahsoft
We invite you to join Fortinet and Carahsoft for our complimentary Demo Desk: Network Security. Discover the power of the Fortinet Fabric architecture for Secure Networking. Fortinet is the only secure-networking vendor that has a single operating system for firewall, switches, APs, and Network Access ...
vmware_Transparent_Logo_80px.png
VMware Webcast

Event Date: September 04, 2024
Hosted By: VMware & Carahsoft
Join us for our Ask Us Anything: VMware Army ELA webcast where you'll hear from Department of Defense IT expert and VMware Army Program Director John Jordan on how you can best leverage VMware technology in this contract.   During this webcast, you'll learn ...
TRM-Microsite-Logo.png
TRM Labs Webcast

Event Date: September 04, 2024
Hosted By: TRM Labs & Carahsoft
As the crypto landscape grows increasingly more complex, law enforcement, civilian, defense, and tax agencies alike need intelligence they can trust to help mitigate and stay ahead of illicit activity on the blockchain. But choosing the right intelligence platform can be a high-stakes, ...
ivanti-logo-red.svg
Ivanti Virtual Event

Event Date: August 17, 2023 - December 05, 2024
Hosted By: Ivanti & Carahsoft
During our Live Tech Demo, attendees found how Ivanti can: Patch Windows OS, third-party apps, VMs, ESXi hypervisor, Red Hat Enterprise Linux, and CentOS
Unqork-microsite.png
Multi-Vendor Event

Event Date: September 06, 2024
Hosted By: Unqork & Carahsoft
Get ready to innovate at the next Unqork Government Hackathon, where the brightest minds around the beltway will come together to tackle the challenge: "Bring Your Own Legacy." This year's hackathon features Rhino.ai, a groundbreaking genAI application migration accelerator ...
Sonatype_Microsite_Logo_Height.png
Sonatype Webcast

Event Date: September 10, 2024
Hosted By: Sonatype & Carahsoft
Government agencies face increasing pressure to secure their critical infrastructure from cyber threats. NIST SP 800-218 and the CISA Secure Software Development Attestation Form mandate robust software supply chain security practices. Join our Sonatype expert for this informative webinar where we will explore ...

Resources


Featured

Google and Okta have joined forces to streamline and secure identity management in higher education, leveraging Okta’s robust IAM platform and Google Workspace’s extensive collaboration tools. This partnership aims to automate identity processes, enhance cross-platform access, and support the unique...

Email_Security_Cover_Image.jpg
Datasheet
Menlo Security datasheet describing Email Security and how it treats all attachments and links as possible risks to prevent malicious content from executing on an end user’s device. Through this Zero Trust approach, all web traffic is isolated to prevent it from accessing the device.

Menlo Security datasheet describing how Browser Isolation provides security teams with visibility and control enabling a Zero Trust approach to protect against malware. Browser Isolation routes all web traffic through a cloud-based remote browser, only allowing the safe content through to the endpoi...

Recent cybersecurity improvements, like zero-trust networks, rely on a strong cybersecurity culture within organizations. Employees play a key role in awareness and defense against cyber threats. Following suit, agencies are prioritizing employee cyber education with training tailored to their speci...

Download this overview resource to learn how Conceal can help protect your agency's network with its intelligence-grade zero trust solution.

Download this Netskope solution brief to discover how Netskope One, powered by the Zero Trust Engine, accelerates your zero trust strategy for secure hybrid work. Gain unmatched contextual awareness and implement least-privileged access seamlessly, without disrupting user behavior.

Illumio_Architecture_thumbnail_.png
Solutions Brief
This document outlines Illumio's Zero Trust Segmentation (ZTS) approach for robust network security, highlighting key components such as the Policy Compute Engine (PCE) and Virtual Enforcement Node (VEN).

Illumio integrates the Department of Defense's Zero Trust Reference Architecture, ensuring robust security across all pillars through comprehensive visualization and policy enforcement.

zero-trust-thumbnail.jpg
Solutions Brief
The perfect solution to the perfect security storm.

In today's sprawling network landscape, achieving zero trust security can feel like a gamble. Legacy security solutions are complex, expensive, and often leave blind spots around your most valuable assets.

This Arista solution brief unveils a different approach. Built on the unified foundatio...