Back to Search Begin New Search Save Search Auto-Notify
Red Hat OpenShift Virtualization Workshop
This workshop was tailored for VM administrators and infrastructure architects looking to explore new virtualization solutions. Attendees gained hands-on experience with OpenShift Virtualization, diving into key concepts such as importing, networking and storage.
Add Favorite
Revolutionizing Cybersecurity for Feder...
Government agencies handle an extensive amount of sensitive data and Controlled Unclassified Information (CUI) that must be diligently managed and protected. Isolated cloud environments, known as GovClouds, help these US government agencies, contractors, and other organizations meet their regulatory and compliance requirements when running sensitive workloads in the cloud. Zscaler is a long-time partner with the government to secure IT moderni...
Add Favorite
Smartsheet Gov Dynamic View Webinar
Smartsheet Gov, Prime Consulting Group, and Carahsoft hosted a webinar on how to use Dynamic View in your solutions to allow your Vendors and External Collaborators access to the information they need but not see the information they shouldn't. Customer were taught how to begin integrating the collection of external information into your organization's workflows in a seamless and secure manner. In this webinar, James Green shared a real use ca...
Add Favorite
Introduction to F5 BIG-IP Next
F5 hosted a virtual lab about the Next generation of BIG-IP software. During the lab, experts Ryan Johnson, Dung Lam, and Gabe Romero provided live demonstrations as well as answering any questions about BIG-IP Next. In this hands-on lab, attendees learned:How to manage BIG-IP Next data plane nodes using the Central Manager GUIHow to deploy and operate applicationsWhat a classic BIG-IP migration to Next entailsHow to protect applications using...
Add Favorite
Dell Technologies Webinar Series 2024-2025
In this Dell Technologies Webinar Series, attendees learned about:AI & Generative AIEdge & 5GCyber Security & Data ProtectionMerging Legacy Virtualization & Cloud Native DevelopmentMission Critical InfrastructureCapturing Workloads & Building IT Solutions
Add Favorite
Accelerating Success: The Importance of...
In today's API-driven landscape, delivering seamless integration experiences is paramount. During this webinar, attendees explored how Continuous Integration and Continuous Delivery (CI/CD) revolutionizes integration projects, enabling faster, more reliable, and more agile API development and deployment.Watch the on-demand recording to discover how CI/CD seamlessly integrates into your integration platform, automating the build, test, and depl...
Add Favorite
Transform Fraud Prevention: From Legacy...
Federal finance administrators face the critical challenge of balancing strong security with seamless user experiences amid evolving cybersecurity threats. This webinar explored how Splunk and ID.me's advanced data analytics and digital identity verification can revolutionize pension program security and operations. Experts discussed human-centered design strategies that enhance fraud prevention while ensuring frictionless services access. Dur...
Add Favorite
Salesforce Lunch & Learn for Los Angele...
Our 3rd Los Angeles Lunch & Learn session was a success. Public Sector agencies gathered to virtually explore the digital transformation that happening in the county. Attendees learned practical tips to customize the platform so that processes are streamlined and efficient.
Add Favorite
Flexible Log Management for Government
As government agencies scale their IT modernization initiatives and deepen their focus on security, managing and maximizing the value of growing log volumes becomes more challenging. This is in addition to complying with logging requirements outlined in mandates such as M-21-31. Attendees joined Datadog as they explored how to collect, process, and store large machine-generated data sets, transforming them from noise into actionable intelligen...
Add Favorite
From the Frontlines: Lessons learned fr...
Deploying Zero Trust for an Operational Technology network differs from deploying it on an IT network. Dragos and BlastWave have learned hard lessons with customers on the best practices for deploying OT Zero Trust in the real world and shared these lessons with attendees. They also explored how the pillars of the multiple OT cybersecurity frameworks (NIST, DoD, NIS2, etc.) are combined to provide a deployable solution for critical OT networks...
Add Favorite
Back to Search Begin New Search