Zoom Trainings - July 2025
Join us for our hands-on 30-minute training sessions in April and receive tailored guidance from Carahsoft’s product specialists to help you master Zoom like a pro. During our Zoom Admin Training, attendees will: Customize user settings and add role assignments. Align their accounts to better support your agency's objectives. Access and interpret usage data for informed decision-making. In our Zoom 101 Training, participants will: Dr...
Securing the Blind Spots of On-Prem Ser...
In this webinar, attendees will learn how to:Understand the hidden risks of Non-Human Identities (NHIs): Explore the security challenges NHIs pose in hybrid environments and why traditional identity tools fall short.Gain visibility and control: Learn how to discover, classify and monitor NHIs across on-prem and cloud systems using Silverfort’s Identity Security Platform.Strengthen your identity security posture: See how real-time risk as...
Unlock Predictable IT: Dell Technologie...
Dell Technologies and Carahsoft would like to invite you to our Unlock Predictable IT: Dell Technologies APEX Infrastructure webinar. Attendees will learn:How to avoid costly import tariffs using Dell APEX Infrastructure's domestic IaaS model.Why government agencies are shifting to hybrid and on-prem solutions—and how Dell supports the transition.What “cloud consumption” truly means, and how Dell APEX delivers flexibility wit...
Identifying Hidden Cracks: Strengthenin...
Gartner presented the SOC Visibility Triad of capabilities (EDR, NDR and SIEM) as foundational capabilities for a SOC team to acquire to be as effective as possible; however, there are hidden assumptions baked into the SOC Visibility Triad that resulted in deployments being vulnerable and sitting on cracked foundations. Additionally, as technology has evolved, asset management solutions need to be capable of helping teams not only identify ass...
Stopping Credential-Based Attacks and L...
Phishing-resistant access is now a mandate, not a nice-to-have. But most federal authentication workflows still rely on passwords or other shared secrets that attackers can easily exploit. These compromises often become the entry point for lateral movement inside networks, escalating the impact of a breach. Join this webinar to learn how Beyond Identity helps agencies strengthen both device and identity assurance without introducing user frict...
Securing Government Systems at Scale: H...
Government agencies at every level—federal, state, and local—face mounting cybersecurity challenges: increasingly sophisticated threats, evolving compliance mandates, limited IT resources, and ongoing pressure to ensure the continuity of public services. Join Cimcor for this timely and informative webinar to explore how CimTrak empowers government entities to take control of their IT environments and respond swiftly to unexpected o...
Mobile Device Investigator Training
ADF Solutions invites you to a free, hands-on training session for Mobile Device Investigator� (MDI)—our field-proven mobile forensics tool trusted by investigators nationwide. Attendees will earn an MDI User Certificate + FREE 6-month license upon completion of training! We are pleased to be offering the training live in Reston, VA! Join our expert instructors for a full day of live, interactive training where you'll gain the skills to...
Navigating Supply Chain Risks: Strategi...
To address the potential for disruptions, policy hindrances and damaged public trust caused by federal supply chain vulnerabilities, U.S. government and defense agencies must gain critical risk insights through improved data visibility. An advanced enterprise data management system is key to achieving this, offering a consolidated view of supplier information that facilitates proactive data quality, efficient onboarding and seamless data integ...
F5 ADC 3.0: Revolutionizing Application...
F5 Tech on Tap is back for 2025! Join F5, Red Hat, and Peraton for this interactive session highlighting how F5 ADC 3.0, F5 AI Gateway, and Red Hat technologies provide the tools you need to maintain resilience across an increasingly complex and expanding threat landscape. Discover how our solutions can empower you to: Combat Emerging AI Threats: Discover the F5 AI Gateway, a cutting-edge solution providing real-time resilience against emergi...
Generative AI for ITOps
Join us for an exclusive webinar on Generative AI for IT Operations (ITOps), where we'll explore how AI is transforming enterprise monitoring, automating workflows, and providing real-time IT service visibility. Webinar Highlights:ScienceLogic AI vision - Introducing Skylar AIAI-Driven Workflow Automation & Efficiency for Root CauseEnhanced Visibility Leveraging Anomalies, Predictive Analysis, and Data SharingAI-Driven, Curated Automation...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.