Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

hewlett-microsite.png
Hewlett Packard Enterprise

Design & Implementation of Zero Trust Architectures for the DoD


Event Date: May 10, 2023
Hosted By: HPE & Carahsoft

The Castle and Moat doctrine for IT information security is officially dead, and Zero Trust Architecture (ZTA) is the new method for securing information resources. Zero trust provides an approach to identity and access management that assumes no user or software is trusted by default. All users, devices, and applications must prove their identity and level of authentication before accessing resources. Key thoughts on this approach are never trust, always verify, assume breach, and explicit verification.

Project Aurora is HPE’s edge-to-cloud zero trust security architecture that helps protect customers from some of today’s most sophisticated malware attacks. Building on HPE’s silicon root of trust, Project Aurora measures everything before it is enabled or released for execution and continuously repeats this measurement during runtime.

Rather than being a point solution, Project Aurora addresses end-to-end security for edge-to-cloud deployments, with new embedded and integrated security solutions starting at the silicon level.

In this webinar, attendees learned about: 

  • The end user value of the HPE ZTA solution approach
  • Where the HPE ZTA solution approach has been deployed
  • HPE Project Aurora and how it accomplishes Zero Trust Architecture.
  • The key capabilities of SW and HW and how they are utilized by HPE for Zero Trust Architecture

Fill out the form below to view this archived event.


Resources


SAAS Security Guide
Guide

SAAS Security Guide

The cybersecurity industry is struggling to hire and retain professionals due to high demand. Job seekers are vulnerable to social engineering scams, especially on platforms like LinkedIn. To stay safe, individuals should scrutinize emails, avoid overly enticing offers, and limit personal information sharing on social media while job hunting.


Fill out the form below to view this Resource.