Back to Search Begin New Search Save Search Auto-Notify
Powerful eSignature Tools for Any Workflow
Discover how Adobe Acrobat Sign’s versatile toolkit can meet the needs of any document workflow. Throughout the presentation, we walk through essential features like request signatures, reusable templates, and customizable web forms, showcasing how Adobe Acrobat Sign adapts to any scale or requirement. While we explore the spectrum of options available for various use cases, we’ll also highlight the power of bulk sending and pre-fi...
Add Favorite
Navigating Change from Xi Leap
Attendees of this webinar learned:Preparing for Ransomware Attacks and Rapid RecoveryCrafting Effective Grant ProposalsThe Advantages of Working with Assured team of experts
Add Favorite
Federal IT Resilience: Are You Prepared...
This insightful webinar explored how Zerto’s Continuous Data Protection safeguards real-time data integrity and ensures rapid recovery from disruptions. Attendees discovered practical techniques for minimizing downtime, automating disaster recovery, and integrating Zerto seamlessly into on-prem and cloud environments. Attendees also learned how Zerto’s solutions, including the Cyber Resilience Vault, can enhance their resilience st...
Add Favorite
Value Streams in Action: A Possible Imp...
Process inefficiencies and communication barriers can hinder effective public service. To overcome these challenges, we introduced the concept of Value Streams and how to turn this theory into action. In this session, participants learned how to visualize entire value streams, track progress and identify bottlenecks. In addition to discoveing tools to collaborate effectively across teams and keep stakeholders informed and engaged.
Add Favorite
The Hidden Dangers of Legacy PAM: Why Y...
Attendees joined Keeper Security on January 14th to explore how government organizations can navigate the complex, ever-expanding threat landscape and overcome challenges introduced by remote work and multi-cloud environments. Keeper explained how to gain practical strategies to protect both human and machine infrastructures effectively with a zero-trust approach. During this webinar, attendees were able to learn about:How to address the zero...
Add Favorite
IPv6 Workshop Series: Achieving IPv6-On...
In this workshop session, the final of our three-part IPv6 series, HexaBuild’s Scott Hogg provided an overview on how DNS64 and NAT64 can be used to facilitate IPv6-only end-nodes reaching IPv4-only services. Along with Infoblox’s Cricket Liu, they reviewed the architectural considerations for this solution and how to configure the DNS64 functionality in Infoblox. Key Learning Objectives:Discuss how the DNS64 address synthesis is p...
Add Favorite
Shielding Public Agencies: Proactively...
HCL Software hosted a webinar exploring how HCL AppScan helps public agencies stay ahead of cybersecurity threats. As cyberattacks grow more sophisticated, ensuring your applications are secure is more critical than ever.
Add Favorite
SMS in Public Safety: Navigating the Ch...
Using Short Message Service (SMS) for public safety-grade communication can significantly improve an agency's operations, but to be effective, it must be implemented correctly—a task that isn't simple. HipLink and Carahsoft featuring Amazon Web Services (AWS) collaborated on a webinar where they explored the challenges and opportunities associated with using SMS in public safety. Download the 30-minute webinar now.
Add Favorite
Black Duck Takes Flight
On January 22nd, Black Duck Software hosted a live discussion exploring how to secure public sector applications.Attendees learned about:What’s new for the public sector at Black DuckHow Black Duck's portfolio supports a risk-based approach to securityTactics to minimize costs across the software development life cycle
Add Favorite
Dell Technologies Webinar Series 2024-2025
In this Dell Technologies Webinar Series, attendees learned about:AI & Generative AIEdge & 5GCyber Security & Data ProtectionMerging Legacy Virtualization & Cloud Native DevelopmentMission Critical InfrastructureCapturing Workloads & Building IT Solutions
Add Favorite
Back to Search Begin New Search