Carahsoft and Partners at SOF Week 2026

Resource Library
This is a dedicated page full of live webinars and written content, created so that SOF Week attendees can earn CPE credits and learn more about what our 2026 exhibiting and demoing partners will be showcasing! 
Company Logo
Webinars & Broadcasts
Securing Air-Gapped Environments - As cyber threats continue to escalate, government agencies are under pressure to move towards a Zero Trust architecture, safeguarding users, critical data, and systems without traditional network perimeters. However, migrating to the cloud can cause security holes in air-gapped systems if threats like data transfer from external storage media, for example, a USB device, aren't attention focuses.
Company Logo
Live Webinar
In this session, we introduce Byos Edge Trust, a new approach to continuous device verification that moves the trust anchor out of the endpoint entirely. Rather than asking software to vouch for software, Edge Trust pairs a physically independent hardware security module with a cloud verification server to produce cryptographically signed, tamper-resistant attestation every ten seconds, automatically, with no user interaction required.
Company Logo
Live Webinar
This session will focus on a practical approach: running AI directly on local devices so teams can work with the information they have, in the moment, without relying on connectivity or worrying about security breaches. If you’re looking at how to make AI useful in the environments your team operates in, this webinar will be a direct look at what’s working and where it’s having real impact.
Company Logo
Live Webinar
In this webinar, we will explore how unified observability provides a comprehensive, correlated view of IT and network environments, enabling organizations to maintain mission readiness while supporting enterprise-scale operations. By integrating data across infrastructure, applications and services, unified observability helps teams quickly detect issues, understand service impacts and resolve problems before they affect mission-critical systems.
Company Logo
Live Webinar
This webinar explores how modern Secure Service Edge (SSE) and Software-Defined Wide Area Networking (SD-WAN) capabilities can deliver zero-trust protection, resilient connectivity and situational dominance at the edge. Attendees will gain insights into: How Versa's unified SASE and SD-WAN architecture strengthens mission assurance across contested environments. Techniques for securely extending enterprise-grade networking to disconnected or tactical networks without compromising latency or bandwidth.
Company Logo
Video & Visual Content
Lilt's secure, AI-powered translation platform helps address critical foreign language capability gaps within the U.S. Department of Defense by combining advanced machine translation with human in the loop learning. The system enables faster, more accurate processing of mission specific language, improving productivity and access to time sensitive information across diverse operational environments.
Company Logo
Product & Technical Documents
The Byos Secure Edge serves as a NSA CSfC-compliant Retransmission Device, addressing critical security gaps when remote workers connect to unmanaged Black networks. Available as an external USB-C device or an embedded M.2 module, it provides the hardware isolation, protocol breaks, and integrated firewall capabilities required under the NSA's Mobile Access Capability Package (MA-CP) 2.7.1
Company Logo
Product & Technical Documents
Meltwater's Public Sector Solutions overview highlights a unified platform for monitoring global media, social, and AI-driven narratives. It enables agencies to analyze information in real time, detect emerging risks, and gain faster insights using natural language queries, reducing analyst workload while improving situational awareness and decision-making.
Company Logo
Reports & Written Content
The cleared workforce remains strong despite ongoing shifts across the federal landscape, with compensation continuing to trend upward and demand holding steady. Employers are prioritizing top talent, rewarding performance, specialized skills, and career growth. Even in an uncertain environment, national security roles continue to offer competitive pay and long-term opportunity.
Company Logo
Reports & Written Content
Cohere for Defense - This resource outlines how Cohere delivers secure, mission aligned generative AI for defense and national security organizations. It highlights Cohere's defense grade models, sovereign deployment options and low compute architecture designed for on prem, air gapped and tactical edge environments. Readers will learn how Cohere enables faster planning, enhanced situational awareness and improved operational readiness across contested domains.
Company Logo
Product & Technical Documents
This whitepaper explores how AI-powered media intelligence helps government teams navigate today's fast-moving information environment. It highlights Meltwater's global listening platform and AI assistant, Mira, which deliver real-time insights, detect emerging narratives, and monitor AI-generated content, enabling faster, more informed decision-making across news, social, and generative AI channels.
Company Logo
Reports & Written Content
Cohere for Intelligence - Cohere delivers foundational AI models and agentic products purpose-built for national security missions, deploying across on-premises, air-gapped and tactical edge environments with zero vendor lock-in. Sovereign by design, Cohere models operate fully within classified networks, processing intelligence across 109+ languages while keeping data secure. Download the resource to learn how intelligence organizations are deploying Cohere to accelerate analysis and mission outcomes.
Company Logo
Reports & Written Content
View this on-demand whitepaper to discover how 1Kosmos protects agencies from cyberthreats, big and small.
Company Logo
Reports & Written Content
Open-source intelligence (OSINT) is a vital complement to traditional intelligence sources, leveraging publicly available data to deliver timely insights into adversary behavior, emerging threats, and operational environments. Its near real-time nature enhances situational awareness and helps fill critical intelligence gaps, but effective use requires strong validation, advanced analytics, and integration with other disciplines.
Company Logo
Reports & Written Content
To address cybersecurity gaps and maintain consistent security across all operational domains, the Navy (NETWARCOM and PEO-Digital) collaborated with Carahsoft, Leidos and Broadcom, selecting the Symantec platform as a unified endpoint protection solution across the broader naval enterprise. This strategic change has resulted in substantial improvements in security posture, system performance and long-term cost efficiency across a wide range of naval networks.
Company Logo
Reports & Written Content
Lilt's secure, AI-powered translation platform helps address critical foreign language capability gaps within the U.S. Department of Defense by combining advanced machine translation with human in the loop learning. The system enables faster, more accurate processing of mission specific language, improving productivity and access to time sensitive information across diverse operational environments.
Company Logo
Product & Technical Documents
Byos Edge Trust moves beyond point-in-time hardware authentication to deliver continuous, autonomous machine posture verification. Every ten seconds, six hardware-attested checks - covering device identity, firmware integrity, user authentication, and network routing - verify whether a device should still have access, requiring no user interaction. Where traditional hardware keys confirm presence at login, Edge Trust answers the more critical question: Should this device still have access right now?
Company Logo
Reports & Written Content
Your AI Agents are Only as Good as the Identity Beneath Them - AI agents are increasingly embedded into government operations to support analytics, automation and decision making, but their effectiveness depends on the quality of the identity data beneath them. Disconnected records, incomplete identifiers and ambiguous relationships across systems undermine accuracy, trust and outcomes at scale.
Company Logo
Reports & Written Content
Socialgist OSINT infrastructure is shifting how intelligence is built. The bottleneck is no longer analytics tools. It is access to reliable, scalable, and governable public web data. Socialgist solves this by operating as upstream data infrastructure. It delivers raw, high-volume, global conversations with the consistency, coverage, and delivery models required for modern OSINT, AI, and national security workflows.
Company Logo
Reports & Written Content
WireScreen is the leading intelligence platform for navigating China risk.
Company Logo
Reports & Written Content
Securing Warfighters at the Tactical Edge - This resource outlines the Department of Defense's transition to a Zero Trust Architecture and the critical need for phishing-resistant MFA to secure modern, distributed environments. It highlights how Yubico's FIPS-validated YubiKeys deliver hardware-based authentication that supports mission partners, enables tactical operations and accelerates Zero Trust adoption.
Company Logo
Reports & Written Content
How WireScreen accelerates the discovery and mapping of China's military UUV production ecosystem.
Company Logo
Reports & Written Content
Modernizing Authentication Across the Department of Defense - This Yubico resource explores the Department of Defense's reliance on CAC-based PKI authentication and the growing gaps in supporting modern environments like cloud, mobile and partner access. It highlights how Yubico's FIDO-based, phishing-resistant MFA solutions can extend high-assurance security beyond traditional CAC limitations.