Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

1280px-Akamai_logo.png
Akamai

Application Security from the Cloud with Akamai


Event Date: July 25, 2019
Hosted By: Akamai Technologies & Carahsoft
As your agency increasingly engages constituents, employees, and contractors through web and IP-based applications, web application security must be a critical priority. Attackers know that disrupting web applications can result in significant loss of important and sensitive government data. To prepare for the inevitable attacks, you need application security solutions that deliver fast and effective protection in order to safeguard your infrastructure and maintain web application performance and availability.

As a leading provider of enterprise cloud computing solutions that make the Internet fast, reliable, and secure, Akamai provides innovative technology for web application security, as well as solutions for web acceleration and performance, mobile performance, media delivery, and cloud security.

Attendees of this webinar were able to learn:
  • How to minimize the risk of data theft with a highly scalable web application firewall
  • How to defend against existing and evolving threats with rules that are continually updated by Akamai’s Threat Intelligence Team
  • How to maintain application performance and availability during attacks by relying on Akamai’s globally distributed architecture

Fill out the form below to view this archived event.


Resources


Importance of Data Sovereignty For Federal Cloud Solutions
Video

Importance of Data Sovereignty For Federal Cloud Solutions

As cloud innovations are driving us forward to a more connected world than ever before, your organization could be at risk. Tune into our video as Hunter Downey, Vice President of Cloud Product & Architecture, discusses how SAP NS2 can protect critical operations from digital threats for highly regulated customers by utilizing data sovereignty solutions.


Fill out the form below to view this Resource.