Back to Search Begin New Search Save Search Auto-Notify
Combat RMF & Compliance Challenges with...
Splunk helps defense agencies monitor and assess their systems for RMF compliance by automating the gathering, analysis, and reporting of system data relevant to RMF control families. Attendees joined us for a complimentary virtual workshop where attendees learned specific ways Splunk helps embrace RMF such as: Continuous monitoring of security controls and their effectiveness Audit trail collection and reporting Helping determine the acceptab...
Add Favorite
DoDIIS 2022 Webinar Series: SecOps Auto...
VMware SaltStack SecOps is a VMware vRealize Automation add-on that delivers continuous compliance and vulnerability remediation with the power of SaltStack Config automation. With SaltStack SecOps, security and operations teams can work together to define a corporate IT security policy, scan systems against it, detect vulnerabilities and non-compliance issues, and actively remediate them - all from a single platform. Attendees of this webinar...
Add Favorite
Palantir Readiness Webinar Series
For government agencies to achieve their most critical objectives, they must optimize the management, allocation, and development of valuable resources. To help them better serve their missions, Palantir developed highly specialized software modules with state-of-the-art granular access controls related to Financial, Asset, and Personnel Management. Attendees registered for any and all of the following session: October 27th: Financial Operatio...
Add Favorite
DoDIIS 2022 Webinar Series: SolarWinds...
Participants will learn the following: Creating alerts that are actionable and provide information on what’s happening and how to fix the issue Removing false positives and false negatives from your alerts Correlating data from multiple modules to provide insight and reduce MTTR Tuning alerts that will get you to zero false positives
Add Favorite
AvePoint Adds Governance, Management, D...
IT leaders can now reduce sprawl, seamlessly set and manage an environment strategy, and protect business-critical data, apps, and flows – without slowing down Power Platform adoption – with the AvePoint Confidence Platform. January 10, 2023 - AvePoint (NASDAQ: AVPT), the most advanced SaaS and data management platform provider, today announced its governance, management, migration, and data protection capabilities now extend to Mi...
Add Favorite
Govern Your MFDs with the Only COTS Sol...
How can mixed hardware, multi-functional device (MFD) enterprises extend the O365 services (including Scan-to-OneDrive for Business) to their employees and devices while meeting the US Government's zero-trust CAC/PIV security protocols? Let Kofax be your solution. Join the on-demand webinar from Kofax and Microsoft to: Discover Kofax ControlSuite's purpose-built integration with Microsoft O365 to maximize O365 services/offerings and multi-func...
Add Favorite
Adversary Emulation at Scale with Rebel...
Rebellion Defense and Carahsoft invited you to learn how your agency can deploy automated adversary emulation with Nova and uncover the security weaknesses that have the greatest real-world consequence for your mission. Experts discussed how you can: Leverage advanced automation to emulate adversary tactics, techniques, and procedures (TTPs) at scale. Gain a contextualized understanding of how cyber defenses truly stand against real-world atta...
Add Favorite
Data Science in a Hybrid World
Large data sets are often located in data centers. If this on-prem environment does not have adequate resources to perform the analysis that a data scientist wants to, they either have to (a) downsample or (b) purchase additional hardware. In the public cloud, however, data scientists have access to unlimited resources, meaning they can scale up to perform analysis on any size of data. Cloudera Data Platform’s (CDP) hybrid platform enabl...
Add Favorite
How to Prepare for CMMC Mandate
RegScale and Carahsoft hosted this webinar to help you and your cybersecurity team prepare for DoD’s mandated Cybersecurity Maturity Model Certification (CMMC) program. Under the CMMC program, all Defense Industrial Base (DIB) contractors will be required to implement certain cybersecurity protection standards and perform self-assessments or obtain third-party certification as a condition of DoD contract award to better protect controlle...
Add Favorite
Contain This! A Back-to-Basics Look at...
Public sector teams talk about embracing container technology because of what it can do for their organization, but what is a container? How can they help? And how does Red Hat OpenShift fit into the equation? In this on-demand webinar, our featured Red Hat speaker, Wes Urquhart, covered: A back-to-basics overview of container technology How that container technology plays into Red Hat OpenShift Ways to learn more about containers and OpenShif...
Add Favorite
Back to Search Begin New Search