Back to Search Begin New Search Save Search Auto-Notify
Maximizing State and Local FYE Spend -...
During this webinar, attendees will learn: Key funding priorities that state and local IT teams should consider at the fiscal year end Which federal funding vehicles to tap for cybersecurity investments Importance of investing in IT solutions such as Riverbed’s scalable unified observability platform that improve visibility across hybrid network environments What solutions will help you hunt for cybersecurity threats originating from ...
Add Favorite
Lessons Learned and the New Normal: Com...
With the impact of the pandemic and a constantly changing threat landscape, educational institutions from K-12 to college and university levels face the task of effectively reducing cyber threats for their students. Learning environments fluctuate between fully remote, fully back in school, and hybrid. How do we enable and enhance cybersecurity with this ever-changing attack surface? Join Infoblox and NetSync for an interactive session on how...
Add Favorite
Data Quality for the Public Sector
Many agencies struggle with the quality of their data. According to Forrester, nearly one-third of analysts spend more than 40 percent of their time vetting and validating their analytics data before it can be used for strategic decision-making. Join Collibra and Carahsoft for this webinar, where attendees will:Learn how Collibra Data Quality can help your agency identify and remediate data quality issues quicklyDiscover how to connect and emp...
Add Favorite
Prisma Cloud and GitLab | CI/CD Pipelin...
GitLab is the DevOps platform that empowers organizations to maximize the overall return on software development by delivering software faster and more efficiently while strengthening security and compliance. With GitLab, every team in your organization can collaboratively plan, build, secure and deploy software to drive business outcomes faster with complete transparency, consistency and traceability. Prisma Cloud's Cloud Workload Protection...
Add Favorite
Automating Your Recruitment Process Wit...
Most federal agencies are extremely concerned about their human capital and the prospect of losing a large part of their staff to retirement. Unfortunately, they are also struggling to hire and onboard quality candidates in a timely fashion.President Biden's Omnibus bill states "the committee recognizes that there are many challenges in recruiting... and encourages the consideration of human resources technology augmented by cloud-agnostic, co...
Add Favorite
Visualizations and Value with the New E...
The Equifax Social Service Verification (SSV) service, from The Work Number®, has helped millions get access to critical social services by providing instant access to the nation's largest centralized database of income and employment records submitted directly by an employer or payroll provider. Join us for a complimentary webinar as we demonstrate the new SSV user interface and unveil the next generation of social service income and empl...
Add Favorite
HPE Edge-to-Cloud Data Fabric for the A...
The value of data has never been clearer. However, data frequently remains siloed within applications. Enterprises are applying DataOps techniques to operationalize the data management and collaborative processes, creating a data pipeline that is shared across owners, managers, and consumers. But DataOps techniques are not enough, leaving organizations looking to adopt modern data fabric technology. The HPE Ezmeral Data fabric enables enterpri...
Add Favorite
Fighting Back Together Against Ransomware
We invite you to register now to learn how integrating Mimecast with Rapid7 Insight IDR and Rapid7 Insight Connect can help you fight back against ransomware attacks. Join Mimecast's Neil Clauson, CISO, and Rapid7's Bob Rudis, Chief Security Data Scientist as we discuss how to: Leverage advanced threat detection, investigation, and response to increase your overall protection Increase your ability to identify email based attacks Take proactive...
Add Favorite
Managing Data Access Policies for Zero Trust
Zero Trust is built around the idea of moving away from a single network perimeter to a layered defense with carefully controlled gateways. This model assumes everything is running independently and is always exposed to potential threats. It is imperative for the U.S. Department of Defense to set up authentication and authorization to protect their systems and data. Users and systems will need to re-authenticate and re-authorize frequently acr...
Add Favorite
Be Your Agency's Leader in Multi-Cloud...
The Intelligence Community (IC) is moving from a single-cloud community to a multi-cloud community with the introduction of the Commercial Cloud Enterprise (C2E) contract. Successful hybrid/multicloud adoption requires thoughtful, purposeful action as a broader availability of platforms and providers implies the IC must become a smarter and more discerning consumer. HashiCorp, a leader in hybrid cloud and Multicloud automation technologies, of...
Add Favorite
Back to Search Begin New Search