Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Palo Alto Networks

DevSecOps in a Mission-Critical Environment


Event Date: May 06, 2020
Hosted By: Palo Alto Networks
During this webinar attendees heard Palo Alto Networks VP of Twistlock, John Morello, and Marc Harrington, F35 Software Architect of the Joint Strike Fighter (JSF) Reprogramming Enterprise, discuss how they have dealt with legacy challenges, and how moving to the Cloud has transformed their application development practices. In addition, attendees learned how JSF is using Cloud Service Providers (CSPs), Palo Alto Networks Twistlock®, and Kubernetes to create a secure application development environment that has cut time to market from years down to days.

Fill out the form below to view this archived event.


Resources


An Introduction to Zero Trust Software - Defined Perimeters
Whitepaper

An Introduction to Zero Trust Software - Defined Perimeters

Securing your network can be a challenge, especially as remote working has become the new norm, organizations have extended themselves to the public cloud and the traditional network perimeter with edge firewalls is dissolving. With COVID-19, companies are pushing forward with rapid digital transformation to maintain business continuity without the need to be in their physical office. Other use cases have reinforced the need to flexibly secure corporate access to meet rapidly changing business requirements. However, this has meant a larger attack surface, putting their most important data at greater risk to cybersecurity threats.

As such, network security should be a priority for every company now more than ever. And to address the new need for secure remote access and connectivity outside the traditional perimeter, strong consideration needs to be given to automated orchestration of new security policies to increase business agility and reduce errors. The most effective way to achieve this security with orchestration is through a Software-Defined Perimeter (SDP). This white paper provides an essential primer on Software Defined Perimeters, their benefits, ideal use cases, and how to deploy them.


Fill out the form below to view this Resource.