Back to Search Begin New Search Save Search Auto-Notify
Closing Federal Agency IT/OT Visibility Gaps
Many federal agencies are experiencing a "visualization gap" where IT and security leaders can't see all the vulnerable assets within their environment or understand the full extent of their IP addressable asset inventories. This is due to the increasing amount of unmanaged and undermanaged devices that are barely visible, typically only by IP address. Join Armis, ShorePoint, and Carahsoft for this complimentary webinar to discuss why total as...
Add Favorite
Attack Surface Management from Palo Alt...
The attack surface of universities and school districts ballooned in recent years with the explosion of remote learning. It's never been more critical to have an up to date inventory of all assets - including IP addresses, domains, certificates, cloud infrastructure and physical systems - connected to your organization. You can't predict with certainty how you will be attacked in the future, but you can learn from recent attacks - and from the...
Add Favorite
Moving to an Endpoint-Centric Zero Trus...
Join SentinelOne on May 26th, to learn the Guiding Principles of ZERO Trust: Never trust, always verify-Treat every user, endpoint, application or workload, and data flow as untrusted. Authenticate and explicitly authorize each to the least privilege required Assume breach-Operate and defend resources with the assumption that an adversary already has a presence within the environment. Deny by default and scrutinize all users, endpoints, data f...
Add Favorite
What's New in OpenShift 4.10?
Evolving technical demands and resource constraints are spurring public sector teams to embrace innovative solutions that support IT modernization, at scale.Red Hat OpenShift, an enterprise-ready Kubernetes container platform built for an open hybrid cloud strategy, provides your organization with a consistent application platform to manage hybrid cloud, MultiCloud and edge deployments.With each new iteration, OpenShift delivers unparalleled e...
Add Favorite
Cybersecurity Maturity Model Certificat...
VMware and Carahsoft would like to offer you the opportunity to view these on-demands on various topics that your organization may be interested in: Session One: Cybersecurity Maturity Model Certification (CMMC) Updates for the Department of Defense's (DoD) strategic direction on the CMMC program included in version 2.0 Clarifications on the different phases of inclusion for bidders, contractors, and service providers How the Executive Order f...
Add Favorite
AWS Cloud Practitioner Boot Camp
During this on-demand, the Carahsoft Technical Team reviews: What the AWS Cloud Platform is and the global infrastructure it provides Basic AWS Cloud architectural principles The AWS Cloud value proposition Key services on the AWS platform and their common use cases Basic security and compliance aspects of the AWS platform and the Shared Responsibility Model The billing, account management, and pricing models Sources of documentation or techni...
Add Favorite
Getting Started with Fraud Investigatio...
Forecasting in Tableau is as simple as drag and drop, but how does Tableau's forecasting really work - behind the drag and drop? Why does forecasting behave the way it does? How can you change Tableau's forecasting model? Why doesn't your forecast work? How can you leverage linear regressions and cluster analysis?Join this live webinar to explore Tableau's forecasting capabilities as well as Benford's Law. Get ready to predict the future!Durin...
Add Favorite
How to Simplify Your Government Workflo...
At the core of every business process are agreements and forms that require signatures. More than 4,500 local, state, and federal agencies are using DocuSign to replace paper-based processes and simplify workflows so staff can more efficiently, and citizens receive a better experience. Figuring out where to start digitizing workflows can be overwhelming. That's why this on-demand webinar features the City of Henderson, who shares their experie...
Add Favorite
Reimagine Cybersecurity
Situational awareness of cybersecurity risks is achieved through assessing and monitoring every corner of your network and the threats that are a part of that landscape. Explore key strategies and approaches to implement the next generation cyber safety structure ahead of the bad actors without ripping and replacing your existing cybersecurity tools. Gain insight on the challenges in the current approach to cybersecurity practices, and how to...
Add Favorite
Adobe ColdFusion Workshop
Registration is now closed Join our complimentary Adobe ColdFusion Workshop to learn how you and your agency can leverage Adobe ColdFusion to create amazing web content. This one-day training will cover all facets of Adobe ColdFusion that developers need to build applications that can run across multiple cloud providers or on premise. Specifically, the workshop will explore: The major features in the latest release of Adobe ColdFusion How to...
Add Favorite
Back to Search Begin New Search