Back to Search Begin New Search Save Search Auto-Notify
Fight Cybercrime with X-Ray Vision
Trustwave Government Solutions Managed Security Services (MSS) is the combination of the industry’s best preventive and detective tools under a world-class managed services umbrella with unrivaled global threat intelligence. Just because you bought a car, doesn’t mean you know how to drive. Purchasing one of the top 10 technical tools requires expert installation, tuning, and ongoing support. Making sense of minor issues to major e...
Add Favorite
Optimize Your Network from Core to Edge...
During this webinar, attendees will learn how to: Unify network data across your domains - flow, packet, SNMP, WiFi, and APIs - onto a single platform Achieve network-wide visibility into network applications across multi-vendor, multi-domain and multi-cloud environments Optimize network performance by proactively identifying, easily troubleshooting, and quickly resolving network issues and application performance issues regardless of where th...
Add Favorite
Business Development Strategies to Maxi...
While SLED governments do not operate on a uniform fiscal year (unlike the federal government), a majority do adhere to the June 30 fiscal year end. In fact, all but four states have an EOFY of June 30. As we approach the unofficial SLED fiscal year end, it’s important to maximize your opportunities with agencies who are hungry to spend their remaining budgets with a ‘use-it-or-lose-it’ mentality. Join us for this webinar wit...
Add Favorite
Modernizing Legacy Identity Governance...
As public sector and education organizations move applications and infrastructure to the cloud, they need to adopt solutions that deliver a rapid time-to-value and low total cost of ownership while also providing strong security. The ongoing proliferation of human and machine identities has stretched legacy identity governance and administration (IGA) systems beyond their capabilities, leaving security gaps throughout organizations.Discover ho...
Add Favorite
Go From Inspiration to Creation Faster...
Designers and creative professionals within the public sector use Adobe Photoshop to make their visions come to life with the all-in-one tool for creativity. And with Adobe Lightroom integration capabilities, you can create, edit, organize, store, and share your photos across any device, with easy ways to adjust exposure, color, and more, to enable you with the tools to create photos that capture your vision. While Adobe Photoshop and Lightroo...
Add Favorite
OpenRoads Designer: The Ultimate Roadwa...
Main street, highway or freeway, designing, building, and maintaining roadways requires a team of skilled engineers. And with constant changes, tight deadlines, and budgets, the job isn't easy. Whether you're responsible for corridor, interchange, roundabout, sanitary or stormwater network design, or the design of subsurface utilities; Bentley's OpenRoads Designer is a versatile application with all the tools needed to deliver projects from st...
Add Favorite
Closing Federal Agency IT/OT Visibility Gaps
Many federal agencies are experiencing a "visualization gap" where IT and security leaders can't see all the vulnerable assets within their environment or understand the full extent of their IP addressable asset inventories. This is due to the increasing amount of unmanaged and undermanaged devices that are barely visible, typically only by IP address. Join Armis, ShorePoint, and Carahsoft for this complimentary webinar to discuss why total as...
Add Favorite
Attack Surface Management from Palo Alt...
The attack surface of universities and school districts ballooned in recent years with the explosion of remote learning. It's never been more critical to have an up to date inventory of all assets - including IP addresses, domains, certificates, cloud infrastructure and physical systems - connected to your organization. You can't predict with certainty how you will be attacked in the future, but you can learn from recent attacks - and from the...
Add Favorite
Moving to an Endpoint-Centric Zero Trus...
Join SentinelOne on May 26th, to learn the Guiding Principles of ZERO Trust: Never trust, always verify-Treat every user, endpoint, application or workload, and data flow as untrusted. Authenticate and explicitly authorize each to the least privilege required Assume breach-Operate and defend resources with the assumption that an adversary already has a presence within the environment. Deny by default and scrutinize all users, endpoints, data f...
Add Favorite
What's New in OpenShift 4.10?
Evolving technical demands and resource constraints are spurring public sector teams to embrace innovative solutions that support IT modernization, at scale.Red Hat OpenShift, an enterprise-ready Kubernetes container platform built for an open hybrid cloud strategy, provides your organization with a consistent application platform to manage hybrid cloud, MultiCloud and edge deployments.With each new iteration, OpenShift delivers unparalleled e...
Add Favorite
Back to Search Begin New Search