Back to Search Begin New Search Save Search Auto-Notify
F5 Air Force TechTalk SSL Break and Inspect
Join F5 Networks and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for Application Cybersecurity protection in the Datacenter. Learn which SSL/TLS standards are necessary to meet the new DoD requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS designs to mitigate web-based App...
December 3, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Hanscom Air Force Base, MA
Add Favorite
F5 Gov TechTalk SSL Break and Inspect
Join F5 Networks, World Wide Technology, Inc. and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for application cybersecurity protection in the data center. Learn which SSL/TLS standards are necessary to meet the new federal requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS...
December 3, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: St. Louis, MO
Add Favorite
BusinessObjects Administration Intellig...
Must-see Demo for BusinessObjects Business Intelligence Software Administrators Is it taking you forever to manage role-based access to your business intelligence software? When your auditor needs access controls updates, is it a pain to pull together all the documentation? When one of your users accidentally deletes a folder or report from their personal folder, how easy or fast is it to bring their content back? View our complimentary on-dem...
December 3, 2015
Organizer: SAP Government Team at Carahsoft
Location: Webcast
Add Favorite
What You Can't See Can Definitely Hurt You
Detecting Modern Cyber Attacks with User Behavior Analytics Most organizations are facing a dual cyber problem: on one hand their security products can’t detect modern insider or hacker attacks, and on the other, their analysts are overwhelmed by security alerts and can’t respond effectively to attacks after detection. User Behavior Analytics (UBA) is a breakthrough technique for detecting and responding to new cyber attacks. View...
December 3, 2015
Organizer: Exabeam Government Team at Carahsoft
Location: Webcast
Add Favorite
F5 Air Force TechTalk SSL Break and Inspect
Join F5 Networks and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for Application Cybersecurity protection in the Datacenter. Learn which SSL/TLS standards are necessary to meet the new DoD requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS designs to mitigate web-based App...
December 1, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Wright-Patterson AFB, OH
Add Favorite
ACG National Capital Monthly Meeting
ACG Capital Monthly Meeting with Peggy Styer, Chief Executive, Raytheon Blackbird Technologies with Key Members of Management Team. Corporate growth strategies, M&A successes, best practices and lessons learned
November 20, 2015
Organizer: ACG National Capital
Location: McLean, VA
Add Favorite
Raytheon Blackbird Technologies and Raz...
A moderated discussion on corporate growth followed by open Q&A with:Peggy Styer CEO, Raytheon Blackbird Technologies, Inc.Managing Partner, Razor's Edge Ventures Tiffanny GatesVice President, Cyber Strategies GroupRaytheon Blackbird Technologies, Inc.Advisor, Razor's Edge Ventures Jack KerriganVice President, OperationsRaytheon Blackbird Technologies, Inc. Managing Director, Razor's Edge Ventures
November 20, 2015
Organizer: ACG National Capital
Location: McLean, VA
Add Favorite
Managing Your Data Deluge
Organizations across the globe are contending with large volumes of well-structured data; however, depending on the mission, the most critical data is often highly variable or unstructured. At the same time, procurement and program management work at cross-purposes to the data-sharing imperative. The MarkLogic Object Based Intelligence (OBI) solution codifies the relationships between people, organizations, and places, while putting them in te...
November 19, 2015
Organizer: MarkLogic Government Team at Carahsoft
Location: Webcast
Add Favorite
F5 | VMware | Force 3 TechTalk
VMware NSX™ is the network virtualization and security platform for the software-defined data center (SDDC). NSX brings virtualization to your existing network and transforms network operations and economics by providing a completely new operational model for networking. Join F5 Networks, VMware, and Force 3 to learn about SDDC and explore the benefits of network virtualization with our NSX experts. What is a SDDC? Overview of NSX and be...
November 19, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Middletown, RI
Add Favorite
Introducing GeoNorth Live
Timely, accurate, high-resolution imagery when and where you need it. View our on-demand webcast for an introduction to GeoNorth Live, a new streaming service designed for state and local governments to automatically receive 50cm imagery updates, directly within existing desktop or client viewing applications. Powered by TerraPixel's Streamap, government users and contractors will benefit from the automated simplicity inherent to GeoNorth Live...
November 19, 2015
Organizer: GeoNorth Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search